From a9d8f264ae64d8a83390f087ddd2d0fb94b1d440 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Apr 2025 22:02:05 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/20xxx/CVE-2025-20096.json | 18 +++++++ 2025/22xxx/CVE-2025-22263.json | 85 +++++++++++++++++++++++++++-- 2025/24xxx/CVE-2025-24519.json | 18 +++++++ 2025/26xxx/CVE-2025-26694.json | 18 +++++++ 2025/27xxx/CVE-2025-27570.json | 18 +++++++ 2025/27xxx/CVE-2025-27710.json | 18 +++++++ 2025/27xxx/CVE-2025-27719.json | 99 ++++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30514.json | 99 ++++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30982.json | 85 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30984.json | 85 +++++++++++++++++++++++++++-- 2025/31xxx/CVE-2025-31654.json | 99 ++++++++++++++++++++++++++++++++-- 2025/35xxx/CVE-2025-35948.json | 18 +++++++ 2025/35xxx/CVE-2025-35949.json | 18 +++++++ 2025/35xxx/CVE-2025-35950.json | 18 +++++++ 2025/35xxx/CVE-2025-35951.json | 18 +++++++ 2025/35xxx/CVE-2025-35952.json | 18 +++++++ 2025/35xxx/CVE-2025-35953.json | 18 +++++++ 2025/35xxx/CVE-2025-35954.json | 18 +++++++ 2025/35xxx/CVE-2025-35955.json | 18 +++++++ 2025/35xxx/CVE-2025-35956.json | 18 +++++++ 2025/35xxx/CVE-2025-35957.json | 18 +++++++ 2025/35xxx/CVE-2025-35958.json | 18 +++++++ 2025/35xxx/CVE-2025-35959.json | 18 +++++++ 2025/36xxx/CVE-2025-36174.json | 18 +++++++ 2025/36xxx/CVE-2025-36175.json | 18 +++++++ 2025/36xxx/CVE-2025-36176.json | 18 +++++++ 2025/36xxx/CVE-2025-36177.json | 18 +++++++ 2025/36xxx/CVE-2025-36178.json | 18 +++++++ 2025/36xxx/CVE-2025-36179.json | 18 +++++++ 2025/36xxx/CVE-2025-36180.json | 18 +++++++ 2025/36xxx/CVE-2025-36181.json | 18 +++++++ 2025/36xxx/CVE-2025-36182.json | 18 +++++++ 2025/36xxx/CVE-2025-36183.json | 18 +++++++ 2025/36xxx/CVE-2025-36184.json | 18 +++++++ 2025/36xxx/CVE-2025-36185.json | 18 +++++++ 2025/36xxx/CVE-2025-36186.json | 18 +++++++ 2025/36xxx/CVE-2025-36187.json | 18 +++++++ 2025/36xxx/CVE-2025-36188.json | 18 +++++++ 2025/36xxx/CVE-2025-36189.json | 18 +++++++ 2025/36xxx/CVE-2025-36190.json | 18 +++++++ 2025/36xxx/CVE-2025-36191.json | 18 +++++++ 2025/36xxx/CVE-2025-36192.json | 18 +++++++ 2025/36xxx/CVE-2025-36193.json | 18 +++++++ 2025/36xxx/CVE-2025-36429.json | 18 +++++++ 2025/36xxx/CVE-2025-36430.json | 18 +++++++ 2025/36xxx/CVE-2025-36431.json | 18 +++++++ 2025/36xxx/CVE-2025-36432.json | 18 +++++++ 2025/36xxx/CVE-2025-36433.json | 18 +++++++ 2025/36xxx/CVE-2025-36434.json | 18 +++++++ 2025/36xxx/CVE-2025-36435.json | 18 +++++++ 2025/36xxx/CVE-2025-36436.json | 18 +++++++ 2025/36xxx/CVE-2025-36437.json | 18 +++++++ 2025/36xxx/CVE-2025-36438.json | 18 +++++++ 2025/36xxx/CVE-2025-36439.json | 18 +++++++ 2025/36xxx/CVE-2025-36440.json | 18 +++++++ 2025/36xxx/CVE-2025-36441.json | 18 +++++++ 2025/36xxx/CVE-2025-36442.json | 18 +++++++ 2025/36xxx/CVE-2025-36443.json | 18 +++++++ 2025/36xxx/CVE-2025-36444.json | 18 +++++++ 2025/36xxx/CVE-2025-36445.json | 18 +++++++ 2025/36xxx/CVE-2025-36446.json | 18 +++++++ 2025/36xxx/CVE-2025-36447.json | 18 +++++++ 2025/36xxx/CVE-2025-36448.json | 18 +++++++ 2025/36xxx/CVE-2025-36667.json | 18 +++++++ 2025/36xxx/CVE-2025-36668.json | 18 +++++++ 2025/36xxx/CVE-2025-36669.json | 18 +++++++ 2025/36xxx/CVE-2025-36670.json | 18 +++++++ 2025/36xxx/CVE-2025-36671.json | 18 +++++++ 2025/36xxx/CVE-2025-36672.json | 18 +++++++ 2025/36xxx/CVE-2025-36673.json | 18 +++++++ 2025/36xxx/CVE-2025-36674.json | 18 +++++++ 2025/36xxx/CVE-2025-36675.json | 18 +++++++ 2025/36xxx/CVE-2025-36676.json | 18 +++++++ 2025/36xxx/CVE-2025-36677.json | 18 +++++++ 2025/36xxx/CVE-2025-36678.json | 18 +++++++ 2025/36xxx/CVE-2025-36679.json | 18 +++++++ 2025/36xxx/CVE-2025-36680.json | 18 +++++++ 2025/36xxx/CVE-2025-36681.json | 18 +++++++ 2025/36xxx/CVE-2025-36682.json | 18 +++++++ 2025/36xxx/CVE-2025-36683.json | 18 +++++++ 2025/36xxx/CVE-2025-36684.json | 18 +++++++ 2025/36xxx/CVE-2025-36685.json | 18 +++++++ 2025/36xxx/CVE-2025-36794.json | 18 +++++++ 2025/36xxx/CVE-2025-36795.json | 18 +++++++ 2025/36xxx/CVE-2025-36796.json | 18 +++++++ 2025/36xxx/CVE-2025-36797.json | 18 +++++++ 2025/36xxx/CVE-2025-36798.json | 18 +++++++ 2025/36xxx/CVE-2025-36799.json | 18 +++++++ 2025/36xxx/CVE-2025-36800.json | 18 +++++++ 2025/36xxx/CVE-2025-36801.json | 18 +++++++ 2025/36xxx/CVE-2025-36802.json | 18 +++++++ 2025/36xxx/CVE-2025-36803.json | 18 +++++++ 2025/36xxx/CVE-2025-36804.json | 18 +++++++ 2025/36xxx/CVE-2025-36805.json | 18 +++++++ 2025/36xxx/CVE-2025-36806.json | 18 +++++++ 2025/36xxx/CVE-2025-36807.json | 18 +++++++ 2025/36xxx/CVE-2025-36808.json | 18 +++++++ 2025/36xxx/CVE-2025-36809.json | 18 +++++++ 2025/36xxx/CVE-2025-36810.json | 18 +++++++ 2025/36xxx/CVE-2025-36811.json | 18 +++++++ 100 files changed, 2220 insertions(+), 24 deletions(-) create mode 100644 2025/20xxx/CVE-2025-20096.json create mode 100644 2025/24xxx/CVE-2025-24519.json create mode 100644 2025/26xxx/CVE-2025-26694.json create mode 100644 2025/27xxx/CVE-2025-27570.json create mode 100644 2025/27xxx/CVE-2025-27710.json create mode 100644 2025/35xxx/CVE-2025-35948.json create mode 100644 2025/35xxx/CVE-2025-35949.json create mode 100644 2025/35xxx/CVE-2025-35950.json create mode 100644 2025/35xxx/CVE-2025-35951.json create mode 100644 2025/35xxx/CVE-2025-35952.json create mode 100644 2025/35xxx/CVE-2025-35953.json create mode 100644 2025/35xxx/CVE-2025-35954.json create mode 100644 2025/35xxx/CVE-2025-35955.json create mode 100644 2025/35xxx/CVE-2025-35956.json create mode 100644 2025/35xxx/CVE-2025-35957.json create mode 100644 2025/35xxx/CVE-2025-35958.json create mode 100644 2025/35xxx/CVE-2025-35959.json create mode 100644 2025/36xxx/CVE-2025-36174.json create mode 100644 2025/36xxx/CVE-2025-36175.json create mode 100644 2025/36xxx/CVE-2025-36176.json create mode 100644 2025/36xxx/CVE-2025-36177.json create mode 100644 2025/36xxx/CVE-2025-36178.json create mode 100644 2025/36xxx/CVE-2025-36179.json create mode 100644 2025/36xxx/CVE-2025-36180.json create mode 100644 2025/36xxx/CVE-2025-36181.json create mode 100644 2025/36xxx/CVE-2025-36182.json create mode 100644 2025/36xxx/CVE-2025-36183.json create mode 100644 2025/36xxx/CVE-2025-36184.json create mode 100644 2025/36xxx/CVE-2025-36185.json create mode 100644 2025/36xxx/CVE-2025-36186.json create mode 100644 2025/36xxx/CVE-2025-36187.json create mode 100644 2025/36xxx/CVE-2025-36188.json create mode 100644 2025/36xxx/CVE-2025-36189.json create mode 100644 2025/36xxx/CVE-2025-36190.json create mode 100644 2025/36xxx/CVE-2025-36191.json create mode 100644 2025/36xxx/CVE-2025-36192.json create mode 100644 2025/36xxx/CVE-2025-36193.json create mode 100644 2025/36xxx/CVE-2025-36429.json create mode 100644 2025/36xxx/CVE-2025-36430.json create mode 100644 2025/36xxx/CVE-2025-36431.json create mode 100644 2025/36xxx/CVE-2025-36432.json create mode 100644 2025/36xxx/CVE-2025-36433.json create mode 100644 2025/36xxx/CVE-2025-36434.json create mode 100644 2025/36xxx/CVE-2025-36435.json create mode 100644 2025/36xxx/CVE-2025-36436.json create mode 100644 2025/36xxx/CVE-2025-36437.json create mode 100644 2025/36xxx/CVE-2025-36438.json create mode 100644 2025/36xxx/CVE-2025-36439.json create mode 100644 2025/36xxx/CVE-2025-36440.json create mode 100644 2025/36xxx/CVE-2025-36441.json create mode 100644 2025/36xxx/CVE-2025-36442.json create mode 100644 2025/36xxx/CVE-2025-36443.json create mode 100644 2025/36xxx/CVE-2025-36444.json create mode 100644 2025/36xxx/CVE-2025-36445.json create mode 100644 2025/36xxx/CVE-2025-36446.json create mode 100644 2025/36xxx/CVE-2025-36447.json create mode 100644 2025/36xxx/CVE-2025-36448.json create mode 100644 2025/36xxx/CVE-2025-36667.json create mode 100644 2025/36xxx/CVE-2025-36668.json create mode 100644 2025/36xxx/CVE-2025-36669.json create mode 100644 2025/36xxx/CVE-2025-36670.json create mode 100644 2025/36xxx/CVE-2025-36671.json create mode 100644 2025/36xxx/CVE-2025-36672.json create mode 100644 2025/36xxx/CVE-2025-36673.json create mode 100644 2025/36xxx/CVE-2025-36674.json create mode 100644 2025/36xxx/CVE-2025-36675.json create mode 100644 2025/36xxx/CVE-2025-36676.json create mode 100644 2025/36xxx/CVE-2025-36677.json create mode 100644 2025/36xxx/CVE-2025-36678.json create mode 100644 2025/36xxx/CVE-2025-36679.json create mode 100644 2025/36xxx/CVE-2025-36680.json create mode 100644 2025/36xxx/CVE-2025-36681.json create mode 100644 2025/36xxx/CVE-2025-36682.json create mode 100644 2025/36xxx/CVE-2025-36683.json create mode 100644 2025/36xxx/CVE-2025-36684.json create mode 100644 2025/36xxx/CVE-2025-36685.json create mode 100644 2025/36xxx/CVE-2025-36794.json create mode 100644 2025/36xxx/CVE-2025-36795.json create mode 100644 2025/36xxx/CVE-2025-36796.json create mode 100644 2025/36xxx/CVE-2025-36797.json create mode 100644 2025/36xxx/CVE-2025-36798.json create mode 100644 2025/36xxx/CVE-2025-36799.json create mode 100644 2025/36xxx/CVE-2025-36800.json create mode 100644 2025/36xxx/CVE-2025-36801.json create mode 100644 2025/36xxx/CVE-2025-36802.json create mode 100644 2025/36xxx/CVE-2025-36803.json create mode 100644 2025/36xxx/CVE-2025-36804.json create mode 100644 2025/36xxx/CVE-2025-36805.json create mode 100644 2025/36xxx/CVE-2025-36806.json create mode 100644 2025/36xxx/CVE-2025-36807.json create mode 100644 2025/36xxx/CVE-2025-36808.json create mode 100644 2025/36xxx/CVE-2025-36809.json create mode 100644 2025/36xxx/CVE-2025-36810.json create mode 100644 2025/36xxx/CVE-2025-36811.json diff --git a/2025/20xxx/CVE-2025-20096.json b/2025/20xxx/CVE-2025-20096.json new file mode 100644 index 00000000000..c12b6e82f36 --- /dev/null +++ b/2025/20xxx/CVE-2025-20096.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-20096", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22263.json b/2025/22xxx/CVE-2025-22263.json index 144bd15a03c..54d09d9ea91 100644 --- a/2025/22xxx/CVE-2025-22263.json +++ b/2025/22xxx/CVE-2025-22263.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-22263", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Global Gallery allows Reflected XSS. This issue affects Global Gallery: from n/a through 8.8.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NotFound", + "product": { + "product_data": [ + { + "product_name": "Global Gallery", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "8.8.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/global-gallery/vulnerability/wordpress-global-gallery-plugin-8-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/global-gallery/vulnerability/wordpress-global-gallery-plugin-8-8-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Bonds (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 7.1, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseSeverity": "HIGH", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1" } ] } diff --git a/2025/24xxx/CVE-2025-24519.json b/2025/24xxx/CVE-2025-24519.json new file mode 100644 index 00000000000..fd03ce8a219 --- /dev/null +++ b/2025/24xxx/CVE-2025-24519.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-24519", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26694.json b/2025/26xxx/CVE-2025-26694.json new file mode 100644 index 00000000000..91d4c5d7a8d --- /dev/null +++ b/2025/26xxx/CVE-2025-26694.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26694", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27570.json b/2025/27xxx/CVE-2025-27570.json new file mode 100644 index 00000000000..34d42c74a66 --- /dev/null +++ b/2025/27xxx/CVE-2025-27570.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27570", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27710.json b/2025/27xxx/CVE-2025-27710.json new file mode 100644 index 00000000000..0930764034c --- /dev/null +++ b/2025/27xxx/CVE-2025-27710.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27710", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27719.json b/2025/27xxx/CVE-2025-27719.json index bd808adb2f5..e43e4fced5a 100644 --- a/2025/27xxx/CVE-2025-27719.json +++ b/2025/27xxx/CVE-2025-27719.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-27719", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unauthenticated attackers can query an API endpoint and get device details." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Growatt", + "product": { + "product_data": [ + { + "product_name": "Cloud portal", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.6.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "ICSA-25-105-04", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:

\n\n
" + } + ], + "value": "Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to Service@Growatt.com.\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity." + } + ], + "credits": [ + { + "lang": "en", + "value": "Forescout Technologies reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30514.json b/2025/30xxx/CVE-2025-30514.json index 9925268267e..605376b132b 100644 --- a/2025/30xxx/CVE-2025-30514.json +++ b/2025/30xxx/CVE-2025-30514.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30514", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Unauthenticated attackers can obtain restricted information about a user's smart device collections (i.e., \"scenes\")." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Growatt", + "product": { + "product_data": [ + { + "product_name": "Cloud portal", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.6.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "ICSA-25-105-04", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:

\n\n
" + } + ], + "value": "Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to Service@Growatt.com.\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity." + } + ], + "credits": [ + { + "lang": "en", + "value": "Forescout Technologies reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30982.json b/2025/30xxx/CVE-2025-30982.json index 86495e591b4..6d305b85306 100644 --- a/2025/30xxx/CVE-2025-30982.json +++ b/2025/30xxx/CVE-2025-30982.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30982", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in zookatron MyBookProgress by Stormhill Media allows Stored XSS. This issue affects MyBookProgress by Stormhill Media: from n/a through 1.0.8." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "zookatron", + "product": { + "product_data": [ + { + "product_name": "MyBookProgress by Stormhill Media", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "1.0.8" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mybookprogress/vulnerability/wordpress-mybookprogress-by-stormhill-media-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/mybookprogress/vulnerability/wordpress-mybookprogress-by-stormhill-media-plugin-1-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Abdi Pranata (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 6.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseSeverity": "MEDIUM", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1" } ] } diff --git a/2025/30xxx/CVE-2025-30984.json b/2025/30xxx/CVE-2025-30984.json index 5d3c8e61a5c..2941befb163 100644 --- a/2025/30xxx/CVE-2025-30984.json +++ b/2025/30xxx/CVE-2025-30984.json @@ -1,17 +1,94 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30984", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound SEO Tools allows Reflected XSS. This issue affects SEO Tools: from n/a through 4.0.7." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "NotFound", + "product": { + "product_data": [ + { + "product_name": "SEO Tools", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "n/a", + "version_value": "4.0.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/seo-automatic-seo-tools/vulnerability/wordpress-seo-tools-plugin-4-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/seo-automatic-seo-tools/vulnerability/wordpress-seo-tools-plugin-4-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "credits": [ + { + "lang": "en", + "value": "Jo\u00e3o Pedro S Alc\u00e2ntara (Kinorth) (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "baseScore": 7.1, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseSeverity": "HIGH", + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "version": "3.1" } ] } diff --git a/2025/31xxx/CVE-2025-31654.json b/2025/31xxx/CVE-2025-31654.json index 86576b7b3a9..8502f31e28c 100644 --- a/2025/31xxx/CVE-2025-31654.json +++ b/2025/31xxx/CVE-2025-31654.json @@ -1,17 +1,108 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-31654", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An attacker can get information about the groups of the smart home devices for arbitrary users (i.e., \"rooms\")." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-639 Authorization Bypass Through User-Controlled Key", + "cweId": "CWE-639" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Growatt", + "product": { + "product_data": [ + { + "product_name": "Cloud portal", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "3.6.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04", + "refsource": "MISC", + "name": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-04" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "advisory": "ICSA-25-105-04", + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "

Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:

\n\n
" + } + ], + "value": "Growatt reports the cloud-based vulnerabilities were patched and no user action is needed. Additionally, Growatt strongly recommends that their users take proactive steps in securing their devices and take the following actions:\n\n * Update all devices to the latest firmware version when available. (Updates are automatic, no user action needed.)\n * Use strong passwords and enable multi-factor authentication where applicable.\n * Report any security concerns to Service@Growatt.com.\n * Stay vigilant. Users and installers should regularly review security settings, follow best practices, and report any unusual activity." + } + ], + "credits": [ + { + "lang": "en", + "value": "Forescout Technologies reported these vulnerabilities to CISA." + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/35xxx/CVE-2025-35948.json b/2025/35xxx/CVE-2025-35948.json new file mode 100644 index 00000000000..9b15f7d5650 --- /dev/null +++ b/2025/35xxx/CVE-2025-35948.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35948", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35949.json b/2025/35xxx/CVE-2025-35949.json new file mode 100644 index 00000000000..695aa256b54 --- /dev/null +++ b/2025/35xxx/CVE-2025-35949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35950.json b/2025/35xxx/CVE-2025-35950.json new file mode 100644 index 00000000000..b0518889fc1 --- /dev/null +++ b/2025/35xxx/CVE-2025-35950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35951.json b/2025/35xxx/CVE-2025-35951.json new file mode 100644 index 00000000000..105c6a2938f --- /dev/null +++ b/2025/35xxx/CVE-2025-35951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35952.json b/2025/35xxx/CVE-2025-35952.json new file mode 100644 index 00000000000..25dc8360ac4 --- /dev/null +++ b/2025/35xxx/CVE-2025-35952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35953.json b/2025/35xxx/CVE-2025-35953.json new file mode 100644 index 00000000000..e79897d487c --- /dev/null +++ b/2025/35xxx/CVE-2025-35953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35954.json b/2025/35xxx/CVE-2025-35954.json new file mode 100644 index 00000000000..d9747ba8030 --- /dev/null +++ b/2025/35xxx/CVE-2025-35954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35955.json b/2025/35xxx/CVE-2025-35955.json new file mode 100644 index 00000000000..fd43a0db435 --- /dev/null +++ b/2025/35xxx/CVE-2025-35955.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35955", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35956.json b/2025/35xxx/CVE-2025-35956.json new file mode 100644 index 00000000000..bdbebab1049 --- /dev/null +++ b/2025/35xxx/CVE-2025-35956.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35956", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35957.json b/2025/35xxx/CVE-2025-35957.json new file mode 100644 index 00000000000..35689b7e9d8 --- /dev/null +++ b/2025/35xxx/CVE-2025-35957.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35957", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35958.json b/2025/35xxx/CVE-2025-35958.json new file mode 100644 index 00000000000..795022f03d8 --- /dev/null +++ b/2025/35xxx/CVE-2025-35958.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35958", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35959.json b/2025/35xxx/CVE-2025-35959.json new file mode 100644 index 00000000000..690b24926de --- /dev/null +++ b/2025/35xxx/CVE-2025-35959.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35959", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36174.json b/2025/36xxx/CVE-2025-36174.json new file mode 100644 index 00000000000..b842a5c152f --- /dev/null +++ b/2025/36xxx/CVE-2025-36174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36175.json b/2025/36xxx/CVE-2025-36175.json new file mode 100644 index 00000000000..0dcf73709ac --- /dev/null +++ b/2025/36xxx/CVE-2025-36175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36176.json b/2025/36xxx/CVE-2025-36176.json new file mode 100644 index 00000000000..07764e4e088 --- /dev/null +++ b/2025/36xxx/CVE-2025-36176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36177.json b/2025/36xxx/CVE-2025-36177.json new file mode 100644 index 00000000000..35d5bec8bdf --- /dev/null +++ b/2025/36xxx/CVE-2025-36177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36178.json b/2025/36xxx/CVE-2025-36178.json new file mode 100644 index 00000000000..4b1496aa0da --- /dev/null +++ b/2025/36xxx/CVE-2025-36178.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36178", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36179.json b/2025/36xxx/CVE-2025-36179.json new file mode 100644 index 00000000000..f5c595e1895 --- /dev/null +++ b/2025/36xxx/CVE-2025-36179.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36179", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36180.json b/2025/36xxx/CVE-2025-36180.json new file mode 100644 index 00000000000..dfb27c118c2 --- /dev/null +++ b/2025/36xxx/CVE-2025-36180.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36180", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36181.json b/2025/36xxx/CVE-2025-36181.json new file mode 100644 index 00000000000..fcd216799a5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36181.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36181", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36182.json b/2025/36xxx/CVE-2025-36182.json new file mode 100644 index 00000000000..27f53f6a321 --- /dev/null +++ b/2025/36xxx/CVE-2025-36182.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36182", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36183.json b/2025/36xxx/CVE-2025-36183.json new file mode 100644 index 00000000000..9fd6af9e104 --- /dev/null +++ b/2025/36xxx/CVE-2025-36183.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36183", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36184.json b/2025/36xxx/CVE-2025-36184.json new file mode 100644 index 00000000000..097612bcab6 --- /dev/null +++ b/2025/36xxx/CVE-2025-36184.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36184", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36185.json b/2025/36xxx/CVE-2025-36185.json new file mode 100644 index 00000000000..1417391bef5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36185.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36185", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36186.json b/2025/36xxx/CVE-2025-36186.json new file mode 100644 index 00000000000..967f814cdae --- /dev/null +++ b/2025/36xxx/CVE-2025-36186.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36186", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36187.json b/2025/36xxx/CVE-2025-36187.json new file mode 100644 index 00000000000..2384259f67f --- /dev/null +++ b/2025/36xxx/CVE-2025-36187.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36187", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36188.json b/2025/36xxx/CVE-2025-36188.json new file mode 100644 index 00000000000..44f6aa5a4b7 --- /dev/null +++ b/2025/36xxx/CVE-2025-36188.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36188", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36189.json b/2025/36xxx/CVE-2025-36189.json new file mode 100644 index 00000000000..f74309ed70b --- /dev/null +++ b/2025/36xxx/CVE-2025-36189.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36189", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36190.json b/2025/36xxx/CVE-2025-36190.json new file mode 100644 index 00000000000..8f397c9bbe9 --- /dev/null +++ b/2025/36xxx/CVE-2025-36190.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36190", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36191.json b/2025/36xxx/CVE-2025-36191.json new file mode 100644 index 00000000000..aee93909ecb --- /dev/null +++ b/2025/36xxx/CVE-2025-36191.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36191", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36192.json b/2025/36xxx/CVE-2025-36192.json new file mode 100644 index 00000000000..7417f6ed036 --- /dev/null +++ b/2025/36xxx/CVE-2025-36192.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36192", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36193.json b/2025/36xxx/CVE-2025-36193.json new file mode 100644 index 00000000000..15e82cdca4c --- /dev/null +++ b/2025/36xxx/CVE-2025-36193.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36193", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36429.json b/2025/36xxx/CVE-2025-36429.json new file mode 100644 index 00000000000..08b1fdedd93 --- /dev/null +++ b/2025/36xxx/CVE-2025-36429.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36429", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36430.json b/2025/36xxx/CVE-2025-36430.json new file mode 100644 index 00000000000..f485c4dcda0 --- /dev/null +++ b/2025/36xxx/CVE-2025-36430.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36430", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36431.json b/2025/36xxx/CVE-2025-36431.json new file mode 100644 index 00000000000..d1f423ce2c8 --- /dev/null +++ b/2025/36xxx/CVE-2025-36431.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36431", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36432.json b/2025/36xxx/CVE-2025-36432.json new file mode 100644 index 00000000000..be4b5fbc1fb --- /dev/null +++ b/2025/36xxx/CVE-2025-36432.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36432", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36433.json b/2025/36xxx/CVE-2025-36433.json new file mode 100644 index 00000000000..af819d24dcd --- /dev/null +++ b/2025/36xxx/CVE-2025-36433.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36433", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36434.json b/2025/36xxx/CVE-2025-36434.json new file mode 100644 index 00000000000..20dcaf102c0 --- /dev/null +++ b/2025/36xxx/CVE-2025-36434.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36434", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36435.json b/2025/36xxx/CVE-2025-36435.json new file mode 100644 index 00000000000..a86c74c985f --- /dev/null +++ b/2025/36xxx/CVE-2025-36435.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36435", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36436.json b/2025/36xxx/CVE-2025-36436.json new file mode 100644 index 00000000000..4e9f0589e44 --- /dev/null +++ b/2025/36xxx/CVE-2025-36436.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36436", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36437.json b/2025/36xxx/CVE-2025-36437.json new file mode 100644 index 00000000000..6ee2616327a --- /dev/null +++ b/2025/36xxx/CVE-2025-36437.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36437", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36438.json b/2025/36xxx/CVE-2025-36438.json new file mode 100644 index 00000000000..fd11b4dd406 --- /dev/null +++ b/2025/36xxx/CVE-2025-36438.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36438", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36439.json b/2025/36xxx/CVE-2025-36439.json new file mode 100644 index 00000000000..aa844000a2f --- /dev/null +++ b/2025/36xxx/CVE-2025-36439.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36439", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36440.json b/2025/36xxx/CVE-2025-36440.json new file mode 100644 index 00000000000..788d8d7a20c --- /dev/null +++ b/2025/36xxx/CVE-2025-36440.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36440", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36441.json b/2025/36xxx/CVE-2025-36441.json new file mode 100644 index 00000000000..460238a074d --- /dev/null +++ b/2025/36xxx/CVE-2025-36441.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36441", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36442.json b/2025/36xxx/CVE-2025-36442.json new file mode 100644 index 00000000000..96310eea2b4 --- /dev/null +++ b/2025/36xxx/CVE-2025-36442.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36442", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36443.json b/2025/36xxx/CVE-2025-36443.json new file mode 100644 index 00000000000..bc26f632d4f --- /dev/null +++ b/2025/36xxx/CVE-2025-36443.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36443", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36444.json b/2025/36xxx/CVE-2025-36444.json new file mode 100644 index 00000000000..e13623cdcb6 --- /dev/null +++ b/2025/36xxx/CVE-2025-36444.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36444", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36445.json b/2025/36xxx/CVE-2025-36445.json new file mode 100644 index 00000000000..a3f820df3ee --- /dev/null +++ b/2025/36xxx/CVE-2025-36445.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36445", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36446.json b/2025/36xxx/CVE-2025-36446.json new file mode 100644 index 00000000000..0e62a9b0726 --- /dev/null +++ b/2025/36xxx/CVE-2025-36446.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36446", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36447.json b/2025/36xxx/CVE-2025-36447.json new file mode 100644 index 00000000000..3a9269977da --- /dev/null +++ b/2025/36xxx/CVE-2025-36447.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36447", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36448.json b/2025/36xxx/CVE-2025-36448.json new file mode 100644 index 00000000000..03f4d5a5be5 --- /dev/null +++ b/2025/36xxx/CVE-2025-36448.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36448", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36667.json b/2025/36xxx/CVE-2025-36667.json new file mode 100644 index 00000000000..8bbec50ae9b --- /dev/null +++ b/2025/36xxx/CVE-2025-36667.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36667", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36668.json b/2025/36xxx/CVE-2025-36668.json new file mode 100644 index 00000000000..e25bf4994a3 --- /dev/null +++ b/2025/36xxx/CVE-2025-36668.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36668", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36669.json b/2025/36xxx/CVE-2025-36669.json new file mode 100644 index 00000000000..fab7b5adb9f --- /dev/null +++ b/2025/36xxx/CVE-2025-36669.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36669", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36670.json b/2025/36xxx/CVE-2025-36670.json new file mode 100644 index 00000000000..cb40dfa4899 --- /dev/null +++ b/2025/36xxx/CVE-2025-36670.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36670", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36671.json b/2025/36xxx/CVE-2025-36671.json new file mode 100644 index 00000000000..9e77c7d2a04 --- /dev/null +++ b/2025/36xxx/CVE-2025-36671.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36671", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36672.json b/2025/36xxx/CVE-2025-36672.json new file mode 100644 index 00000000000..fbb922b7d3b --- /dev/null +++ b/2025/36xxx/CVE-2025-36672.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36672", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36673.json b/2025/36xxx/CVE-2025-36673.json new file mode 100644 index 00000000000..142846c3617 --- /dev/null +++ b/2025/36xxx/CVE-2025-36673.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36673", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36674.json b/2025/36xxx/CVE-2025-36674.json new file mode 100644 index 00000000000..5e96a66f93f --- /dev/null +++ b/2025/36xxx/CVE-2025-36674.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36674", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36675.json b/2025/36xxx/CVE-2025-36675.json new file mode 100644 index 00000000000..eb222706506 --- /dev/null +++ b/2025/36xxx/CVE-2025-36675.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36675", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36676.json b/2025/36xxx/CVE-2025-36676.json new file mode 100644 index 00000000000..4aeaa10be80 --- /dev/null +++ b/2025/36xxx/CVE-2025-36676.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36676", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36677.json b/2025/36xxx/CVE-2025-36677.json new file mode 100644 index 00000000000..8ff6324343d --- /dev/null +++ b/2025/36xxx/CVE-2025-36677.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36677", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36678.json b/2025/36xxx/CVE-2025-36678.json new file mode 100644 index 00000000000..592e7c79966 --- /dev/null +++ b/2025/36xxx/CVE-2025-36678.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36678", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36679.json b/2025/36xxx/CVE-2025-36679.json new file mode 100644 index 00000000000..70d0458bc6b --- /dev/null +++ b/2025/36xxx/CVE-2025-36679.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36679", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36680.json b/2025/36xxx/CVE-2025-36680.json new file mode 100644 index 00000000000..a485deacf88 --- /dev/null +++ b/2025/36xxx/CVE-2025-36680.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36680", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36681.json b/2025/36xxx/CVE-2025-36681.json new file mode 100644 index 00000000000..dcb33cd2985 --- /dev/null +++ b/2025/36xxx/CVE-2025-36681.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36681", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36682.json b/2025/36xxx/CVE-2025-36682.json new file mode 100644 index 00000000000..03656f0ca8b --- /dev/null +++ b/2025/36xxx/CVE-2025-36682.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36682", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36683.json b/2025/36xxx/CVE-2025-36683.json new file mode 100644 index 00000000000..73b55dbbd92 --- /dev/null +++ b/2025/36xxx/CVE-2025-36683.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36683", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36684.json b/2025/36xxx/CVE-2025-36684.json new file mode 100644 index 00000000000..b91a1270d48 --- /dev/null +++ b/2025/36xxx/CVE-2025-36684.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36684", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36685.json b/2025/36xxx/CVE-2025-36685.json new file mode 100644 index 00000000000..c7b170a9c63 --- /dev/null +++ b/2025/36xxx/CVE-2025-36685.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36685", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36794.json b/2025/36xxx/CVE-2025-36794.json new file mode 100644 index 00000000000..c53dce4ada6 --- /dev/null +++ b/2025/36xxx/CVE-2025-36794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36795.json b/2025/36xxx/CVE-2025-36795.json new file mode 100644 index 00000000000..2080ad38438 --- /dev/null +++ b/2025/36xxx/CVE-2025-36795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36796.json b/2025/36xxx/CVE-2025-36796.json new file mode 100644 index 00000000000..d6248caa8f9 --- /dev/null +++ b/2025/36xxx/CVE-2025-36796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36797.json b/2025/36xxx/CVE-2025-36797.json new file mode 100644 index 00000000000..98090867a38 --- /dev/null +++ b/2025/36xxx/CVE-2025-36797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36798.json b/2025/36xxx/CVE-2025-36798.json new file mode 100644 index 00000000000..0e952c8b45c --- /dev/null +++ b/2025/36xxx/CVE-2025-36798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36799.json b/2025/36xxx/CVE-2025-36799.json new file mode 100644 index 00000000000..6ef72977618 --- /dev/null +++ b/2025/36xxx/CVE-2025-36799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36800.json b/2025/36xxx/CVE-2025-36800.json new file mode 100644 index 00000000000..b38b8c32d02 --- /dev/null +++ b/2025/36xxx/CVE-2025-36800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36801.json b/2025/36xxx/CVE-2025-36801.json new file mode 100644 index 00000000000..bfb3a4c18a6 --- /dev/null +++ b/2025/36xxx/CVE-2025-36801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36802.json b/2025/36xxx/CVE-2025-36802.json new file mode 100644 index 00000000000..e8d20bbebc3 --- /dev/null +++ b/2025/36xxx/CVE-2025-36802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36803.json b/2025/36xxx/CVE-2025-36803.json new file mode 100644 index 00000000000..d6cdf2b6dda --- /dev/null +++ b/2025/36xxx/CVE-2025-36803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36804.json b/2025/36xxx/CVE-2025-36804.json new file mode 100644 index 00000000000..ef8afac6c2f --- /dev/null +++ b/2025/36xxx/CVE-2025-36804.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36804", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36805.json b/2025/36xxx/CVE-2025-36805.json new file mode 100644 index 00000000000..d6bc15e1c6f --- /dev/null +++ b/2025/36xxx/CVE-2025-36805.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36805", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36806.json b/2025/36xxx/CVE-2025-36806.json new file mode 100644 index 00000000000..c4dd146b9e7 --- /dev/null +++ b/2025/36xxx/CVE-2025-36806.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36806", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36807.json b/2025/36xxx/CVE-2025-36807.json new file mode 100644 index 00000000000..79c72044182 --- /dev/null +++ b/2025/36xxx/CVE-2025-36807.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36807", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36808.json b/2025/36xxx/CVE-2025-36808.json new file mode 100644 index 00000000000..582e3287394 --- /dev/null +++ b/2025/36xxx/CVE-2025-36808.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36808", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36809.json b/2025/36xxx/CVE-2025-36809.json new file mode 100644 index 00000000000..097279ca805 --- /dev/null +++ b/2025/36xxx/CVE-2025-36809.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36809", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36810.json b/2025/36xxx/CVE-2025-36810.json new file mode 100644 index 00000000000..1dd42d7f0bd --- /dev/null +++ b/2025/36xxx/CVE-2025-36810.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36810", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/36xxx/CVE-2025-36811.json b/2025/36xxx/CVE-2025-36811.json new file mode 100644 index 00000000000..e4708f2843d --- /dev/null +++ b/2025/36xxx/CVE-2025-36811.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-36811", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file