From c1a4c055e42620f0677e943e6c8b1cd1a24480b5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 12 Feb 2025 20:00:38 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/1xxx/CVE-2025-1216.json | 104 +++++++++++++++++++++++++++++++-- 2025/1xxx/CVE-2025-1224.json | 104 +++++++++++++++++++++++++++++++-- 2025/26xxx/CVE-2025-26627.json | 18 ++++++ 2025/26xxx/CVE-2025-26628.json | 18 ++++++ 2025/26xxx/CVE-2025-26629.json | 18 ++++++ 2025/26xxx/CVE-2025-26630.json | 18 ++++++ 2025/26xxx/CVE-2025-26631.json | 18 ++++++ 2025/26xxx/CVE-2025-26632.json | 18 ++++++ 2025/26xxx/CVE-2025-26633.json | 18 ++++++ 2025/26xxx/CVE-2025-26634.json | 18 ++++++ 2025/26xxx/CVE-2025-26635.json | 18 ++++++ 2025/26xxx/CVE-2025-26636.json | 18 ++++++ 2025/26xxx/CVE-2025-26637.json | 18 ++++++ 2025/26xxx/CVE-2025-26638.json | 18 ++++++ 2025/26xxx/CVE-2025-26639.json | 18 ++++++ 2025/26xxx/CVE-2025-26640.json | 18 ++++++ 2025/26xxx/CVE-2025-26641.json | 18 ++++++ 2025/26xxx/CVE-2025-26642.json | 18 ++++++ 2025/26xxx/CVE-2025-26643.json | 18 ++++++ 2025/26xxx/CVE-2025-26644.json | 18 ++++++ 2025/26xxx/CVE-2025-26645.json | 18 ++++++ 2025/26xxx/CVE-2025-26646.json | 18 ++++++ 2025/26xxx/CVE-2025-26647.json | 18 ++++++ 2025/26xxx/CVE-2025-26648.json | 18 ++++++ 2025/26xxx/CVE-2025-26649.json | 18 ++++++ 2025/26xxx/CVE-2025-26650.json | 18 ++++++ 2025/26xxx/CVE-2025-26651.json | 18 ++++++ 2025/26xxx/CVE-2025-26652.json | 18 ++++++ 28 files changed, 668 insertions(+), 8 deletions(-) create mode 100644 2025/26xxx/CVE-2025-26627.json create mode 100644 2025/26xxx/CVE-2025-26628.json create mode 100644 2025/26xxx/CVE-2025-26629.json create mode 100644 2025/26xxx/CVE-2025-26630.json create mode 100644 2025/26xxx/CVE-2025-26631.json create mode 100644 2025/26xxx/CVE-2025-26632.json create mode 100644 2025/26xxx/CVE-2025-26633.json create mode 100644 2025/26xxx/CVE-2025-26634.json create mode 100644 2025/26xxx/CVE-2025-26635.json create mode 100644 2025/26xxx/CVE-2025-26636.json create mode 100644 2025/26xxx/CVE-2025-26637.json create mode 100644 2025/26xxx/CVE-2025-26638.json create mode 100644 2025/26xxx/CVE-2025-26639.json create mode 100644 2025/26xxx/CVE-2025-26640.json create mode 100644 2025/26xxx/CVE-2025-26641.json create mode 100644 2025/26xxx/CVE-2025-26642.json create mode 100644 2025/26xxx/CVE-2025-26643.json create mode 100644 2025/26xxx/CVE-2025-26644.json create mode 100644 2025/26xxx/CVE-2025-26645.json create mode 100644 2025/26xxx/CVE-2025-26646.json create mode 100644 2025/26xxx/CVE-2025-26647.json create mode 100644 2025/26xxx/CVE-2025-26648.json create mode 100644 2025/26xxx/CVE-2025-26649.json create mode 100644 2025/26xxx/CVE-2025-26650.json create mode 100644 2025/26xxx/CVE-2025-26651.json create mode 100644 2025/26xxx/CVE-2025-26652.json diff --git a/2025/1xxx/CVE-2025-1216.json b/2025/1xxx/CVE-2025-1216.json index 5f8ecd74723..48bd990a51c 100644 --- a/2025/1xxx/CVE-2025-1216.json +++ b/2025/1xxx/CVE-2025-1216.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1216", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability, which was classified as critical, has been found in ywoa up to 2024.07.03. This issue affects the function selectNoticeList of the file com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "Eine Schwachstelle wurde in ywoa bis 2024.07.03 entdeckt. Sie wurde als kritisch eingestuft. Davon betroffen ist die Funktion selectNoticeList der Datei com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. Dank Manipulation des Arguments sort mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2024.07.04 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ywoa", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2024.07.03" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.295175", + "refsource": "MISC", + "name": "https://vuldb.com/?id.295175" + }, + { + "url": "https://vuldb.com/?ctiid.295175", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.295175" + }, + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI74K", + "refsource": "MISC", + "name": "https://gitee.com/r1bbit/yimioa/issues/IBI74K" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB Gitee Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/1xxx/CVE-2025-1224.json b/2025/1xxx/CVE-2025-1224.json index 73fb91de54c..ae586dba37c 100644 --- a/2025/1xxx/CVE-2025-1224.json +++ b/2025/1xxx/CVE-2025-1224.json @@ -1,17 +1,113 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1224", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cna@vuldb.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A vulnerability classified as critical was found in ywoa up to 2024.07.03. This vulnerability affects the function listNameBySql of the file com/cloudweb/oa/mapper/xml/UserMapper.xml. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "deu", + "value": "In ywoa bis 2024.07.03 wurde eine Schwachstelle entdeckt. Sie wurde als kritisch eingestuft. Es geht um die Funktion listNameBySql der Datei com/cloudweb/oa/mapper/xml/UserMapper.xml. Durch die Manipulation mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Ein Aktualisieren auf die Version 2024.07.04 vermag dieses Problem zu l\u00f6sen. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "SQL Injection", + "cweId": "CWE-89" + } + ] + }, + { + "description": [ + { + "lang": "eng", + "value": "Injection", + "cweId": "CWE-74" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "ywoa", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "2024.07.03" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://vuldb.com/?id.295210", + "refsource": "MISC", + "name": "https://vuldb.com/?id.295210" + }, + { + "url": "https://vuldb.com/?ctiid.295210", + "refsource": "MISC", + "name": "https://vuldb.com/?ctiid.295210" + }, + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI731", + "refsource": "MISC", + "name": "https://gitee.com/r1bbit/yimioa/issues/IBI731" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "VulDB Gitee Analyzer" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "baseScore": 6.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "3.0", + "baseScore": 6.3, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseSeverity": "MEDIUM" + }, + { + "version": "2.0", + "baseScore": 6.5, + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P" } ] } diff --git a/2025/26xxx/CVE-2025-26627.json b/2025/26xxx/CVE-2025-26627.json new file mode 100644 index 00000000000..a2b4a1cbaa2 --- /dev/null +++ b/2025/26xxx/CVE-2025-26627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26628.json b/2025/26xxx/CVE-2025-26628.json new file mode 100644 index 00000000000..07496c00548 --- /dev/null +++ b/2025/26xxx/CVE-2025-26628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26629.json b/2025/26xxx/CVE-2025-26629.json new file mode 100644 index 00000000000..a1f4b569cc3 --- /dev/null +++ b/2025/26xxx/CVE-2025-26629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26630.json b/2025/26xxx/CVE-2025-26630.json new file mode 100644 index 00000000000..a17f1e20dae --- /dev/null +++ b/2025/26xxx/CVE-2025-26630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26631.json b/2025/26xxx/CVE-2025-26631.json new file mode 100644 index 00000000000..53ebfccd098 --- /dev/null +++ b/2025/26xxx/CVE-2025-26631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26632.json b/2025/26xxx/CVE-2025-26632.json new file mode 100644 index 00000000000..47b76c54c0c --- /dev/null +++ b/2025/26xxx/CVE-2025-26632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26633.json b/2025/26xxx/CVE-2025-26633.json new file mode 100644 index 00000000000..2681b594922 --- /dev/null +++ b/2025/26xxx/CVE-2025-26633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26634.json b/2025/26xxx/CVE-2025-26634.json new file mode 100644 index 00000000000..caf8b5a8836 --- /dev/null +++ b/2025/26xxx/CVE-2025-26634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26635.json b/2025/26xxx/CVE-2025-26635.json new file mode 100644 index 00000000000..ddb7e018bb9 --- /dev/null +++ b/2025/26xxx/CVE-2025-26635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26636.json b/2025/26xxx/CVE-2025-26636.json new file mode 100644 index 00000000000..f5ee74b1f3a --- /dev/null +++ b/2025/26xxx/CVE-2025-26636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26637.json b/2025/26xxx/CVE-2025-26637.json new file mode 100644 index 00000000000..c484499ba94 --- /dev/null +++ b/2025/26xxx/CVE-2025-26637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26638.json b/2025/26xxx/CVE-2025-26638.json new file mode 100644 index 00000000000..6b1c9f4f2ca --- /dev/null +++ b/2025/26xxx/CVE-2025-26638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26639.json b/2025/26xxx/CVE-2025-26639.json new file mode 100644 index 00000000000..e2a66f8cf36 --- /dev/null +++ b/2025/26xxx/CVE-2025-26639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26640.json b/2025/26xxx/CVE-2025-26640.json new file mode 100644 index 00000000000..32eba38bbae --- /dev/null +++ b/2025/26xxx/CVE-2025-26640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26641.json b/2025/26xxx/CVE-2025-26641.json new file mode 100644 index 00000000000..baef068aca3 --- /dev/null +++ b/2025/26xxx/CVE-2025-26641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26642.json b/2025/26xxx/CVE-2025-26642.json new file mode 100644 index 00000000000..5f33dbe0c5c --- /dev/null +++ b/2025/26xxx/CVE-2025-26642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26643.json b/2025/26xxx/CVE-2025-26643.json new file mode 100644 index 00000000000..c2d9f4b126b --- /dev/null +++ b/2025/26xxx/CVE-2025-26643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26644.json b/2025/26xxx/CVE-2025-26644.json new file mode 100644 index 00000000000..ceaac1e5dce --- /dev/null +++ b/2025/26xxx/CVE-2025-26644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26645.json b/2025/26xxx/CVE-2025-26645.json new file mode 100644 index 00000000000..729577864ed --- /dev/null +++ b/2025/26xxx/CVE-2025-26645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26646.json b/2025/26xxx/CVE-2025-26646.json new file mode 100644 index 00000000000..0022e279145 --- /dev/null +++ b/2025/26xxx/CVE-2025-26646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26647.json b/2025/26xxx/CVE-2025-26647.json new file mode 100644 index 00000000000..37b5a93e1f9 --- /dev/null +++ b/2025/26xxx/CVE-2025-26647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26648.json b/2025/26xxx/CVE-2025-26648.json new file mode 100644 index 00000000000..f2b94def665 --- /dev/null +++ b/2025/26xxx/CVE-2025-26648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26649.json b/2025/26xxx/CVE-2025-26649.json new file mode 100644 index 00000000000..27bce512b07 --- /dev/null +++ b/2025/26xxx/CVE-2025-26649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26650.json b/2025/26xxx/CVE-2025-26650.json new file mode 100644 index 00000000000..783bfc05386 --- /dev/null +++ b/2025/26xxx/CVE-2025-26650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26651.json b/2025/26xxx/CVE-2025-26651.json new file mode 100644 index 00000000000..a7f5fc858b0 --- /dev/null +++ b/2025/26xxx/CVE-2025-26651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/26xxx/CVE-2025-26652.json b/2025/26xxx/CVE-2025-26652.json new file mode 100644 index 00000000000..182afca317a --- /dev/null +++ b/2025/26xxx/CVE-2025-26652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-26652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file