From b67dc88522ea27fd70d5abd73ad49bbfd7b6d14d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 26 Feb 2025 15:00:37 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2022/49xxx/CVE-2022-49143.json | 110 +------------------------------- 2022/49xxx/CVE-2022-49690.json | 8 +-- 2022/49xxx/CVE-2022-49732.json | 103 ++++++++++++++++++++++++++++-- 2024/52xxx/CVE-2024-52925.json | 56 ++++++++++++++-- 2025/0xxx/CVE-2025-0719.json | 83 ++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1249.json | 113 +++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1716.json | 71 +++++++++++++++++++-- 2025/22xxx/CVE-2025-22261.json | 42 ++++++++++-- 2025/25xxx/CVE-2025-25783.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25784.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25785.json | 61 ++++++++++++++++-- 2025/25xxx/CVE-2025-25789.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25790.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25791.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25792.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25793.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25794.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25796.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25797.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25799.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25800.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25802.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25813.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25818.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25823.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25825.json | 66 +++++++++++++++++-- 2025/25xxx/CVE-2025-25827.json | 66 +++++++++++++++++-- 2025/27xxx/CVE-2025-27467.json | 18 ++++++ 2025/27xxx/CVE-2025-27468.json | 18 ++++++ 2025/27xxx/CVE-2025-27469.json | 18 ++++++ 2025/27xxx/CVE-2025-27470.json | 18 ++++++ 2025/27xxx/CVE-2025-27471.json | 18 ++++++ 2025/27xxx/CVE-2025-27472.json | 18 ++++++ 2025/27xxx/CVE-2025-27473.json | 18 ++++++ 2025/27xxx/CVE-2025-27474.json | 18 ++++++ 2025/27xxx/CVE-2025-27475.json | 18 ++++++ 2025/27xxx/CVE-2025-27476.json | 18 ++++++ 2025/27xxx/CVE-2025-27477.json | 18 ++++++ 2025/27xxx/CVE-2025-27478.json | 18 ++++++ 2025/27xxx/CVE-2025-27479.json | 18 ++++++ 2025/27xxx/CVE-2025-27480.json | 18 ++++++ 2025/27xxx/CVE-2025-27481.json | 18 ++++++ 2025/27xxx/CVE-2025-27482.json | 18 ++++++ 2025/27xxx/CVE-2025-27483.json | 18 ++++++ 2025/27xxx/CVE-2025-27484.json | 18 ++++++ 2025/27xxx/CVE-2025-27485.json | 18 ++++++ 2025/27xxx/CVE-2025-27486.json | 18 ++++++ 2025/27xxx/CVE-2025-27487.json | 18 ++++++ 2025/27xxx/CVE-2025-27488.json | 18 ++++++ 2025/27xxx/CVE-2025-27489.json | 18 ++++++ 2025/27xxx/CVE-2025-27490.json | 18 ++++++ 2025/27xxx/CVE-2025-27491.json | 18 ++++++ 2025/27xxx/CVE-2025-27492.json | 18 ++++++ 53 files changed, 2047 insertions(+), 256 deletions(-) create mode 100644 2025/27xxx/CVE-2025-27467.json create mode 100644 2025/27xxx/CVE-2025-27468.json create mode 100644 2025/27xxx/CVE-2025-27469.json create mode 100644 2025/27xxx/CVE-2025-27470.json create mode 100644 2025/27xxx/CVE-2025-27471.json create mode 100644 2025/27xxx/CVE-2025-27472.json create mode 100644 2025/27xxx/CVE-2025-27473.json create mode 100644 2025/27xxx/CVE-2025-27474.json create mode 100644 2025/27xxx/CVE-2025-27475.json create mode 100644 2025/27xxx/CVE-2025-27476.json create mode 100644 2025/27xxx/CVE-2025-27477.json create mode 100644 2025/27xxx/CVE-2025-27478.json create mode 100644 2025/27xxx/CVE-2025-27479.json create mode 100644 2025/27xxx/CVE-2025-27480.json create mode 100644 2025/27xxx/CVE-2025-27481.json create mode 100644 2025/27xxx/CVE-2025-27482.json create mode 100644 2025/27xxx/CVE-2025-27483.json create mode 100644 2025/27xxx/CVE-2025-27484.json create mode 100644 2025/27xxx/CVE-2025-27485.json create mode 100644 2025/27xxx/CVE-2025-27486.json create mode 100644 2025/27xxx/CVE-2025-27487.json create mode 100644 2025/27xxx/CVE-2025-27488.json create mode 100644 2025/27xxx/CVE-2025-27489.json create mode 100644 2025/27xxx/CVE-2025-27490.json create mode 100644 2025/27xxx/CVE-2025-27491.json create mode 100644 2025/27xxx/CVE-2025-27492.json diff --git a/2022/49xxx/CVE-2022-49143.json b/2022/49xxx/CVE-2022-49143.json index 09706bf2786..4ae9f95aa71 100644 --- a/2022/49xxx/CVE-2022-49143.json +++ b/2022/49xxx/CVE-2022-49143.json @@ -5,120 +5,14 @@ "CVE_data_meta": { "ID": "CVE-2022-49143", "ASSIGNER": "cve@kernel.org", - "STATE": "PUBLIC" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix possible overflow on 'first_minor' in nbd_dev_add()\n\nWhen 'index' is a big numbers, it may become negative which forced\nto 'int'. then 'index << part_shift' might overflow to a positive\nvalue that is not greater than '0xfffff', then sysfs might complains\nabout duplicate creation. Because of this, move the 'index' judgment\nto the front will fix it and be better." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Linux", - "product": { - "product_data": [ - { - "product_name": "Linux", - "version": { - "version_data": [ - { - "version_affected": "<", - "version_name": "b0d9111a2d53785847763c64c40af2d4c4c5a8b7", - "version_value": "5142720dbe51befeb25f204f912ef1ad93fba343" - }, - { - "version_value": "not down converted", - "x_cve_json_5_version_data": { - "versions": [ - { - "version": "4.11", - "status": "affected" - }, - { - "version": "0", - "lessThan": "4.11", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.15.34", - "lessThanOrEqual": "5.15.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.16.19", - "lessThanOrEqual": "5.16.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.17.2", - "lessThanOrEqual": "5.17.*", - "status": "unaffected", - "versionType": "semver" - }, - { - "version": "5.18", - "lessThanOrEqual": "*", - "status": "unaffected", - "versionType": "original_commit_for_fix" - } - ], - "defaultStatus": "affected" - } - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://git.kernel.org/stable/c/5142720dbe51befeb25f204f912ef1ad93fba343", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/5142720dbe51befeb25f204f912ef1ad93fba343" - }, - { - "url": "https://git.kernel.org/stable/c/d42740aab3ea29578d11a042bb50ded12ad3aa8a", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/d42740aab3ea29578d11a042bb50ded12ad3aa8a" - }, - { - "url": "https://git.kernel.org/stable/c/c6399f6f2f84921feebbf985e3819b1ad851ebe5", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/c6399f6f2f84921feebbf985e3819b1ad851ebe5" - }, - { - "url": "https://git.kernel.org/stable/c/6d35d04a9e18990040e87d2bbf72689252669d54", - "refsource": "MISC", - "name": "https://git.kernel.org/stable/c/6d35d04a9e18990040e87d2bbf72689252669d54" - } - ] - }, - "generator": { - "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2022/49xxx/CVE-2022-49690.json b/2022/49xxx/CVE-2022-49690.json index b7770b088ed..954a11417d4 100644 --- a/2022/49xxx/CVE-2022-49690.json +++ b/2022/49xxx/CVE-2022-49690.json @@ -1,17 +1,17 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-49690", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } diff --git a/2022/49xxx/CVE-2022-49732.json b/2022/49xxx/CVE-2022-49732.json index 2c50804fe29..ab502ed6043 100644 --- a/2022/49xxx/CVE-2022-49732.json +++ b/2022/49xxx/CVE-2022-49732.json @@ -1,18 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-49732", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@kernel.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nsock: redo the psock vs ULP protection check\n\nCommit 8a59f9d1e3d4 (\"sock: Introduce sk->sk_prot->psock_update_sk_prot()\")\nhas moved the inet_csk_has_ulp(sk) check from sk_psock_init() to\nthe new tcp_bpf_update_proto() function. I'm guessing that this\nwas done to allow creating psocks for non-inet sockets.\n\nUnfortunately the destruction path for psock includes the ULP\nunwind, so we need to fail the sk_psock_init() itself.\nOtherwise if ULP is already present we'll notice that later,\nand call tcp_update_ulp() with the sk_proto of the ULP\nitself, which will most likely result in the ULP looping\nits callbacks." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Linux", + "product": { + "product_data": [ + { + "product_name": "Linux", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "8a59f9d1e3d4340659fdfee8879dc09a6f2546e1", + "version_value": "72fa0f65b56605b8a9ae9fba2082f2123f7fe017" + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "5.13", + "status": "affected" + }, + { + "version": "0", + "lessThan": "5.13", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.15.51", + "lessThanOrEqual": "5.15.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.18.8", + "lessThanOrEqual": "5.18.*", + "status": "unaffected", + "versionType": "semver" + }, + { + "version": "5.19", + "lessThanOrEqual": "*", + "status": "unaffected", + "versionType": "original_commit_for_fix" + } + ], + "defaultStatus": "affected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/stable/c/72fa0f65b56605b8a9ae9fba2082f2123f7fe017", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/72fa0f65b56605b8a9ae9fba2082f2123f7fe017" + }, + { + "url": "https://git.kernel.org/stable/c/922309e50befb0cfa5cb65e4989b7706d6578846", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/922309e50befb0cfa5cb65e4989b7706d6578846" + }, + { + "url": "https://git.kernel.org/stable/c/e34a07c0ae3906f97eb18df50902e2a01c1015b6", + "refsource": "MISC", + "name": "https://git.kernel.org/stable/c/e34a07c0ae3906f97eb18df50902e2a01c1015b6" + } + ] + }, + "generator": { + "engine": "bippy-5f407fcff5a0" } } \ No newline at end of file diff --git a/2024/52xxx/CVE-2024-52925.json b/2024/52xxx/CVE-2024-52925.json index 609e01ed83a..a805d6de645 100644 --- a/2024/52xxx/CVE-2024-52925.json +++ b/2024/52xxx/CVE-2024-52925.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-52925", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-52925", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In OPSWAT MetaDefender Kiosk before 4.7.0, arbitrary code execution can be performed by an attacker via the MD Kiosk Unlock Device feature for software encrypted USB drives." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://www.opswat.com/docs/mdkiosk/release-notes/cve-2024-52925", + "url": "https://www.opswat.com/docs/mdkiosk/release-notes/cve-2024-52925" } ] } diff --git a/2025/0xxx/CVE-2025-0719.json b/2025/0xxx/CVE-2025-0719.json index 867466cf300..6e7e9c8c9ee 100644 --- a/2025/0xxx/CVE-2025-0719.json +++ b/2025/0xxx/CVE-2025-0719.json @@ -1,17 +1,92 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-0719", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@us.ibm.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "IBM Cloud Pak for Data 4.0.0 through 4.8.5 and 5.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IBM", + "product": { + "product_data": [ + { + "product_name": "Cloud Pak for Data", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "4.0.0", + "version_value": "4.8.5" + }, + { + "version_affected": "=", + "version_value": "5.0.0" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.ibm.com/support/pages/node/7184173", + "refsource": "MISC", + "name": "https://www.ibm.com/support/pages/node/7184173" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "NONE", + "scope": "CHANGED", + "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1249.json b/2025/1xxx/CVE-2025-1249.json index fe1f79f22d8..6489c61672f 100644 --- a/2025/1xxx/CVE-2025-1249.json +++ b/2025/1xxx/CVE-2025-1249.json @@ -1,17 +1,122 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1249", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "audit@patchstack.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Missing Authorization vulnerability in Pixelite Events Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Events Manager: from n/a through 6.6.4.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-862 Missing Authorization", + "cweId": "CWE-862" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Pixelite", + "product": { + "product_data": [ + { + "product_name": "Events Manager", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "6.6.4.2", + "status": "unaffected" + } + ], + "lessThanOrEqual": "6.6.4.1", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/events-manager/vulnerability/wordpress-events-manager-plugin-6-6-4-1-broken-access-control-vulnerability?_s_id=cve", + "refsource": "MISC", + "name": "https://patchstack.com/database/wordpress/plugin/events-manager/vulnerability/wordpress-events-manager-plugin-6-6-4-1-broken-access-control-vulnerability?_s_id=cve" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "source": { + "discovery": "EXTERNAL" + }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update the WordPress Events Manager wordpress plugin to the latest available version (at least 6.6.4.2)." + } + ], + "value": "Update the WordPress Events Manager wordpress plugin to the latest available version (at least 6.6.4.2)." + } + ], + "credits": [ + { + "lang": "en", + "value": "Revan Arifio (Patchstack Alliance)" + } + ], + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/1xxx/CVE-2025-1716.json b/2025/1xxx/CVE-2025-1716.json index 8756c8661a5..3d88e0c489a 100644 --- a/2025/1xxx/CVE-2025-1716.json +++ b/2025/1xxx/CVE-2025-1716.json @@ -1,18 +1,79 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1716", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@sonatype.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-184 Incomplete List of Disallowed Inputs", + "cweId": "CWE-184" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "mmaitre314", + "product": { + "product_data": [ + { + "product_name": "picklescan", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "0.0.0", + "version_value": "0.0.20" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1716", + "refsource": "MISC", + "name": "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1716" + }, + { + "url": "https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d", + "refsource": "MISC", + "name": "https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d" + } + ] + }, + "generator": { + "engine": "Vulnogram 0.2.0" + }, + "credits": [ + { + "lang": "en", + "value": "Trevor Madge (@madgetr) of Sonatype" + } + ] } \ No newline at end of file diff --git a/2025/22xxx/CVE-2025-22261.json b/2025/22xxx/CVE-2025-22261.json index 116ad509e71..e2fd9c648ee 100644 --- a/2025/22xxx/CVE-2025-22261.json +++ b/2025/22xxx/CVE-2025-22261.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite WP FullCalendar allows Stored XSS.This issue affects WP FullCalendar: from n/a through 1.5." + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pixelite WP FullCalendar wp-fullcalendar allows Stored XSS.This issue affects WP FullCalendar: from n/a through 1.5." } ] }, @@ -40,9 +40,24 @@ "version": { "version_data": [ { - "version_affected": "<=", - "version_name": "n/a", - "version_value": "1.5" + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "changes": [ + { + "at": "1.6", + "status": "unaffected" + } + ], + "lessThanOrEqual": "1.5", + "status": "affected", + "version": "n/a", + "versionType": "custom" + } + ], + "defaultStatus": "unaffected" + } } ] } @@ -68,6 +83,19 @@ "source": { "discovery": "EXTERNAL" }, + "solution": [ + { + "lang": "en", + "supportingMedia": [ + { + "base64": false, + "type": "text/html", + "value": "Update to 1.6 or a higher version." + } + ], + "value": "Update to\u00a01.6 or a higher version." + } + ], "credits": [ { "lang": "en", @@ -77,17 +105,17 @@ "impact": { "cvss": [ { - "baseScore": 6.5, - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", - "baseSeverity": "MEDIUM", "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" } ] diff --git a/2025/25xxx/CVE-2025-25783.json b/2025/25xxx/CVE-2025-25783.json index 7c58bc08386..51f804c39d4 100644 --- a/2025/25xxx/CVE-2025-25783.json +++ b/2025/25xxx/CVE-2025-25783.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25783", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25783", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability in the component admin\\plugin.php of Emlog Pro v2.5.3 allows attackers to execute arbitrary code via uploading a crafted Zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.emlog.net/", + "refsource": "MISC", + "name": "https://www.emlog.net/" + }, + { + "url": "http://emlogpro.com", + "refsource": "MISC", + "name": "http://emlogpro.com" + }, + { + "url": "https://github.com/Ka7arotto/emlog/blob/main/emlog-3.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/emlog/blob/main/emlog-3.md" } ] } diff --git a/2025/25xxx/CVE-2025-25784.json b/2025/25xxx/CVE-2025-25784.json index c8a2e526d5d..60afc6db61a 100644 --- a/2025/25xxx/CVE-2025-25784.json +++ b/2025/25xxx/CVE-2025-25784.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25784", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25784", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability in the component \\c\\TemplateController.php of Jizhicms v2.5.4 allows attackers to execute arbitrary code via uploading a crafted Zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://jizhicms.com", + "refsource": "MISC", + "name": "http://jizhicms.com" + }, + { + "url": "https://www.jizhicms.cn/", + "refsource": "MISC", + "name": "https://www.jizhicms.cn/" + }, + { + "url": "https://github.com/Ka7arotto/JizhiCms/blob/main/jizhicms.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/JizhiCms/blob/main/jizhicms.md" } ] } diff --git a/2025/25xxx/CVE-2025-25785.json b/2025/25xxx/CVE-2025-25785.json index b4cef5ad316..13a8189b42a 100644 --- a/2025/25xxx/CVE-2025-25785.json +++ b/2025/25xxx/CVE-2025-25785.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25785", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25785", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "JizhiCMS v2.5.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the component \\c\\PluginsController.php. This vulnerability allows attackers to perform an intranet scan via a crafted request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://jizhicms.com", + "refsource": "MISC", + "name": "http://jizhicms.com" + }, + { + "url": "https://www.jizhicms.cn/", + "refsource": "MISC", + "name": "https://www.jizhicms.cn/" } ] } diff --git a/2025/25xxx/CVE-2025-25789.json b/2025/25xxx/CVE-2025-25789.json index 7adc7aca875..24e705dcb40 100644 --- a/2025/25xxx/CVE-2025-25789.json +++ b/2025/25xxx/CVE-2025-25789.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25789", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25789", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FoxCMS v1.2.5 was discovered to contain a remote code execution (RCE) vulnerability via the index() method at \\controller\\Sitemap.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://foxcms.com", + "refsource": "MISC", + "name": "http://foxcms.com" + }, + { + "url": "https://www.foxcms.cn/", + "refsource": "MISC", + "name": "https://www.foxcms.cn/" + }, + { + "url": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-rce3.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-rce3.md" } ] } diff --git a/2025/25xxx/CVE-2025-25790.json b/2025/25xxx/CVE-2025-25790.json index 3766c8f376d..c8cb8ed0444 100644 --- a/2025/25xxx/CVE-2025-25790.json +++ b/2025/25xxx/CVE-2025-25790.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25790", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25790", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability in the component \\controller\\LocalTemplate.php of FoxCMS v1.2.5 allows attackers to execute arbitrary code via uploading a crafted Zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://foxcms.com", + "refsource": "MISC", + "name": "http://foxcms.com" + }, + { + "url": "https://www.foxcms.cn/", + "refsource": "MISC", + "name": "https://www.foxcms.cn/" + }, + { + "url": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-upload-rce.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/FoxCMS/blob/main/FoxCMS-upload-rce.md" } ] } diff --git a/2025/25xxx/CVE-2025-25791.json b/2025/25xxx/CVE-2025-25791.json index 8c3c97f89db..ebbeab90eb7 100644 --- a/2025/25xxx/CVE-2025-25791.json +++ b/2025/25xxx/CVE-2025-25791.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25791", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25791", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An arbitrary file upload vulnerability in the plugin installation feature of YZNCMS v2.0.1 allows attackers to execute arbitrary code via uploading a crafted Zip file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://yzncms.com", + "refsource": "MISC", + "name": "http://yzncms.com" + }, + { + "url": "https://gitee.com/ken678/YZNCMS", + "refsource": "MISC", + "name": "https://gitee.com/ken678/YZNCMS" + }, + { + "url": "https://github.com/Ka7arotto/YZNCMS/blob/main/yzncms-upload.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/YZNCMS/blob/main/yzncms-upload.md" } ] } diff --git a/2025/25xxx/CVE-2025-25792.json b/2025/25xxx/CVE-2025-25792.json index feb509de0ab..9185abd53b7 100644 --- a/2025/25xxx/CVE-2025-25792.json +++ b/2025/25xxx/CVE-2025-25792.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25792", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25792", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the isopen parameter at admin_weixin.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/seacmsv13.3-rce-1.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/seacmsv13.3-rce-1.md" } ] } diff --git a/2025/25xxx/CVE-2025-25793.json b/2025/25xxx/CVE-2025-25793.json index c4efe7eef51..d5fc5630f63 100644 --- a/2025/25xxx/CVE-2025-25793.json +++ b/2025/25xxx/CVE-2025-25793.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25793", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25793", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_notify.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-3.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-3.md" } ] } diff --git a/2025/25xxx/CVE-2025-25794.json b/2025/25xxx/CVE-2025-25794.json index 1aa52324a1d..9a0f1f15211 100644 --- a/2025/25xxx/CVE-2025-25794.json +++ b/2025/25xxx/CVE-2025-25794.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25794", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25794", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_ping.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-4.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-4.md" } ] } diff --git a/2025/25xxx/CVE-2025-25796.json b/2025/25xxx/CVE-2025-25796.json index 58e49393761..1e3e201152e 100644 --- a/2025/25xxx/CVE-2025-25796.json +++ b/2025/25xxx/CVE-2025-25796.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25796", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25796", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_template.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-6.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-6.md" } ] } diff --git a/2025/25xxx/CVE-2025-25797.json b/2025/25xxx/CVE-2025-25797.json index 728d3f8a747..aa8b589c6bd 100644 --- a/2025/25xxx/CVE-2025-25797.json +++ b/2025/25xxx/CVE-2025-25797.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25797", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25797", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_smtp.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-7.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-7.md" } ] } diff --git a/2025/25xxx/CVE-2025-25799.json b/2025/25xxx/CVE-2025-25799.json index 590638421b5..2a6ad6c2dff 100644 --- a/2025/25xxx/CVE-2025-25799.json +++ b/2025/25xxx/CVE-2025-25799.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25799", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25799", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf.md" } ] } diff --git a/2025/25xxx/CVE-2025-25800.json b/2025/25xxx/CVE-2025-25800.json index 9e78895ab39..0316f6f41c9 100644 --- a/2025/25xxx/CVE-2025-25800.json +++ b/2025/25xxx/CVE-2025-25800.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25800", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25800", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS 13.3 was discovered to contain an arbitrary file read vulnerability in the file_get_contents function at admin_safe_file.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf-2.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-lrf-2.md" } ] } diff --git a/2025/25xxx/CVE-2025-25802.json b/2025/25xxx/CVE-2025-25802.json index 8700d1e6681..2cd97e6a871 100644 --- a/2025/25xxx/CVE-2025-25802.json +++ b/2025/25xxx/CVE-2025-25802.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25802", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25802", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_ip.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-2.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-2.md" } ] } diff --git a/2025/25xxx/CVE-2025-25813.json b/2025/25xxx/CVE-2025-25813.json index a12ce63ce0c..a75ad3319aa 100644 --- a/2025/25xxx/CVE-2025-25813.json +++ b/2025/25xxx/CVE-2025-25813.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_files.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://seacms.com", + "refsource": "MISC", + "name": "http://seacms.com" + }, + { + "url": "https://www.seacms.com/", + "refsource": "MISC", + "name": "https://www.seacms.com/" + }, + { + "url": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-5.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/Seacms/blob/main/Seacms13.3-rce-5.md" } ] } diff --git a/2025/25xxx/CVE-2025-25818.json b/2025/25xxx/CVE-2025-25818.json index a285307129e..22ab8c9964d 100644 --- a/2025/25xxx/CVE-2025-25818.json +++ b/2025/25xxx/CVE-2025-25818.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25818", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25818", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in Emlog Pro v2.5.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the postStrVar function at article_save.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.emlog.net/", + "refsource": "MISC", + "name": "https://www.emlog.net/" + }, + { + "url": "http://emlogpro.com", + "refsource": "MISC", + "name": "http://emlogpro.com" + }, + { + "url": "https://github.com/Ka7arotto/emlog/blob/main/xss.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/emlog/blob/main/xss.md" } ] } diff --git a/2025/25xxx/CVE-2025-25823.json b/2025/25xxx/CVE-2025-25823.json index a45db0b7e1e..d42a71e085b 100644 --- a/2025/25xxx/CVE-2025-25823.json +++ b/2025/25xxx/CVE-2025-25823.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25823", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25823", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in Emlog Pro v2.5.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the article header at /admin/article.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.emlog.net/", + "refsource": "MISC", + "name": "https://www.emlog.net/" + }, + { + "url": "http://emlogpro.com", + "refsource": "MISC", + "name": "http://emlogpro.com" + }, + { + "url": "https://github.com/Ka7arotto/emlog/blob/main/xss-3.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/emlog/blob/main/xss-3.md" } ] } diff --git a/2025/25xxx/CVE-2025-25825.json b/2025/25xxx/CVE-2025-25825.json index dbdafe32dd2..4b21b0dffff 100644 --- a/2025/25xxx/CVE-2025-25825.json +++ b/2025/25xxx/CVE-2025-25825.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25825", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25825", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A cross-site scripting (XSS) vulnerability in Emlog Pro v2.5.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Titile in the article category section." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.emlog.net/", + "refsource": "MISC", + "name": "https://www.emlog.net/" + }, + { + "url": "http://emlogpro.com", + "refsource": "MISC", + "name": "http://emlogpro.com" + }, + { + "url": "https://github.com/Ka7arotto/emlog/blob/main/xss-4.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/emlog/blob/main/xss-4.md" } ] } diff --git a/2025/25xxx/CVE-2025-25827.json b/2025/25xxx/CVE-2025-25827.json index b1744f56487..15314fa0542 100644 --- a/2025/25xxx/CVE-2025-25827.json +++ b/2025/25xxx/CVE-2025-25827.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-25827", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-25827", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Server-Side Request Forgery (SSRF) in the component sort.php of Emlog Pro v2.5.4 allows attackers to scan local and internal ports via supplying a crafted URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.emlog.net/", + "refsource": "MISC", + "name": "https://www.emlog.net/" + }, + { + "url": "http://emlogpro.com", + "refsource": "MISC", + "name": "http://emlogpro.com" + }, + { + "url": "https://github.com/Ka7arotto/emlog/blob/main/ssrf.md", + "refsource": "MISC", + "name": "https://github.com/Ka7arotto/emlog/blob/main/ssrf.md" } ] } diff --git a/2025/27xxx/CVE-2025-27467.json b/2025/27xxx/CVE-2025-27467.json new file mode 100644 index 00000000000..8488fcbb607 --- /dev/null +++ b/2025/27xxx/CVE-2025-27467.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27467", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27468.json b/2025/27xxx/CVE-2025-27468.json new file mode 100644 index 00000000000..cc5cfbfcc3c --- /dev/null +++ b/2025/27xxx/CVE-2025-27468.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27468", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27469.json b/2025/27xxx/CVE-2025-27469.json new file mode 100644 index 00000000000..bc1097d5bc4 --- /dev/null +++ b/2025/27xxx/CVE-2025-27469.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27469", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27470.json b/2025/27xxx/CVE-2025-27470.json new file mode 100644 index 00000000000..a58d317e04d --- /dev/null +++ b/2025/27xxx/CVE-2025-27470.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27470", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27471.json b/2025/27xxx/CVE-2025-27471.json new file mode 100644 index 00000000000..c1bb9c59fba --- /dev/null +++ b/2025/27xxx/CVE-2025-27471.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27471", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27472.json b/2025/27xxx/CVE-2025-27472.json new file mode 100644 index 00000000000..dcca5fefee3 --- /dev/null +++ b/2025/27xxx/CVE-2025-27472.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27472", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27473.json b/2025/27xxx/CVE-2025-27473.json new file mode 100644 index 00000000000..d97c763d5b3 --- /dev/null +++ b/2025/27xxx/CVE-2025-27473.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27473", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27474.json b/2025/27xxx/CVE-2025-27474.json new file mode 100644 index 00000000000..8578afdc5e8 --- /dev/null +++ b/2025/27xxx/CVE-2025-27474.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27474", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27475.json b/2025/27xxx/CVE-2025-27475.json new file mode 100644 index 00000000000..b4ecda52ea1 --- /dev/null +++ b/2025/27xxx/CVE-2025-27475.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27475", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27476.json b/2025/27xxx/CVE-2025-27476.json new file mode 100644 index 00000000000..bd38e49e17b --- /dev/null +++ b/2025/27xxx/CVE-2025-27476.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27476", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27477.json b/2025/27xxx/CVE-2025-27477.json new file mode 100644 index 00000000000..22b8e8e5b32 --- /dev/null +++ b/2025/27xxx/CVE-2025-27477.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27477", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27478.json b/2025/27xxx/CVE-2025-27478.json new file mode 100644 index 00000000000..74dd2220621 --- /dev/null +++ b/2025/27xxx/CVE-2025-27478.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27478", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27479.json b/2025/27xxx/CVE-2025-27479.json new file mode 100644 index 00000000000..22266d4eec0 --- /dev/null +++ b/2025/27xxx/CVE-2025-27479.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27479", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27480.json b/2025/27xxx/CVE-2025-27480.json new file mode 100644 index 00000000000..0ee029f14f4 --- /dev/null +++ b/2025/27xxx/CVE-2025-27480.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27480", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27481.json b/2025/27xxx/CVE-2025-27481.json new file mode 100644 index 00000000000..37f76a844f9 --- /dev/null +++ b/2025/27xxx/CVE-2025-27481.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27481", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27482.json b/2025/27xxx/CVE-2025-27482.json new file mode 100644 index 00000000000..d03976d1543 --- /dev/null +++ b/2025/27xxx/CVE-2025-27482.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27482", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27483.json b/2025/27xxx/CVE-2025-27483.json new file mode 100644 index 00000000000..041f1d8a25b --- /dev/null +++ b/2025/27xxx/CVE-2025-27483.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27483", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27484.json b/2025/27xxx/CVE-2025-27484.json new file mode 100644 index 00000000000..e5a175d46b1 --- /dev/null +++ b/2025/27xxx/CVE-2025-27484.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27484", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27485.json b/2025/27xxx/CVE-2025-27485.json new file mode 100644 index 00000000000..20f788d6138 --- /dev/null +++ b/2025/27xxx/CVE-2025-27485.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27485", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27486.json b/2025/27xxx/CVE-2025-27486.json new file mode 100644 index 00000000000..b39914e54e8 --- /dev/null +++ b/2025/27xxx/CVE-2025-27486.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27486", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27487.json b/2025/27xxx/CVE-2025-27487.json new file mode 100644 index 00000000000..17591f80cef --- /dev/null +++ b/2025/27xxx/CVE-2025-27487.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27487", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27488.json b/2025/27xxx/CVE-2025-27488.json new file mode 100644 index 00000000000..ac1b1175d69 --- /dev/null +++ b/2025/27xxx/CVE-2025-27488.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27488", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27489.json b/2025/27xxx/CVE-2025-27489.json new file mode 100644 index 00000000000..f214172f51b --- /dev/null +++ b/2025/27xxx/CVE-2025-27489.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27489", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27490.json b/2025/27xxx/CVE-2025-27490.json new file mode 100644 index 00000000000..aed70af50a5 --- /dev/null +++ b/2025/27xxx/CVE-2025-27490.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27490", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27491.json b/2025/27xxx/CVE-2025-27491.json new file mode 100644 index 00000000000..546fc19c54b --- /dev/null +++ b/2025/27xxx/CVE-2025-27491.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27491", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/27xxx/CVE-2025-27492.json b/2025/27xxx/CVE-2025-27492.json new file mode 100644 index 00000000000..699463d9e41 --- /dev/null +++ b/2025/27xxx/CVE-2025-27492.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-27492", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file