From c6d96f312cbdc05941f3a2a5c4ba04287d9c178a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 10 Apr 2025 13:00:32 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2024/11xxx/CVE-2024-11218.json | 25 ++++++++- 2025/0xxx/CVE-2025-0624.json | 26 +++++++++ 2025/1xxx/CVE-2025-1677.json | 100 +++++++++++++++++++++++++++++++-- 2025/25xxx/CVE-2025-25197.json | 86 ++++++++++++++++++++++++++-- 2025/27xxx/CVE-2025-27812.json | 56 ++++++++++++++++-- 2025/27xxx/CVE-2025-27813.json | 56 ++++++++++++++++-- 2025/2xxx/CVE-2025-2408.json | 100 +++++++++++++++++++++++++++++++-- 2025/32xxx/CVE-2025-32776.json | 18 ++++++ 2025/32xxx/CVE-2025-32777.json | 18 ++++++ 2025/32xxx/CVE-2025-32778.json | 18 ++++++ 2025/32xxx/CVE-2025-32779.json | 18 ++++++ 2025/32xxx/CVE-2025-32780.json | 18 ++++++ 2025/32xxx/CVE-2025-32781.json | 18 ++++++ 2025/32xxx/CVE-2025-32782.json | 18 ++++++ 2025/32xxx/CVE-2025-32783.json | 18 ++++++ 2025/32xxx/CVE-2025-32784.json | 18 ++++++ 2025/32xxx/CVE-2025-32785.json | 18 ++++++ 2025/32xxx/CVE-2025-32786.json | 18 ++++++ 2025/32xxx/CVE-2025-32787.json | 18 ++++++ 2025/32xxx/CVE-2025-32788.json | 18 ++++++ 2025/32xxx/CVE-2025-32789.json | 18 ++++++ 2025/32xxx/CVE-2025-32790.json | 18 ++++++ 2025/32xxx/CVE-2025-32791.json | 18 ++++++ 2025/32xxx/CVE-2025-32792.json | 18 ++++++ 2025/32xxx/CVE-2025-32793.json | 18 ++++++ 2025/32xxx/CVE-2025-32794.json | 18 ++++++ 2025/32xxx/CVE-2025-32795.json | 18 ++++++ 2025/32xxx/CVE-2025-32796.json | 18 ++++++ 2025/32xxx/CVE-2025-32797.json | 18 ++++++ 2025/32xxx/CVE-2025-32798.json | 18 ++++++ 2025/32xxx/CVE-2025-32799.json | 18 ++++++ 2025/32xxx/CVE-2025-32800.json | 18 ++++++ 2025/32xxx/CVE-2025-32801.json | 18 ++++++ 2025/32xxx/CVE-2025-32802.json | 18 ++++++ 2025/32xxx/CVE-2025-32803.json | 18 ++++++ 2025/3xxx/CVE-2025-3500.json | 18 ++++++ 2025/3xxx/CVE-2025-3501.json | 18 ++++++ 37 files changed, 962 insertions(+), 27 deletions(-) create mode 100644 2025/32xxx/CVE-2025-32776.json create mode 100644 2025/32xxx/CVE-2025-32777.json create mode 100644 2025/32xxx/CVE-2025-32778.json create mode 100644 2025/32xxx/CVE-2025-32779.json create mode 100644 2025/32xxx/CVE-2025-32780.json create mode 100644 2025/32xxx/CVE-2025-32781.json create mode 100644 2025/32xxx/CVE-2025-32782.json create mode 100644 2025/32xxx/CVE-2025-32783.json create mode 100644 2025/32xxx/CVE-2025-32784.json create mode 100644 2025/32xxx/CVE-2025-32785.json create mode 100644 2025/32xxx/CVE-2025-32786.json create mode 100644 2025/32xxx/CVE-2025-32787.json create mode 100644 2025/32xxx/CVE-2025-32788.json create mode 100644 2025/32xxx/CVE-2025-32789.json create mode 100644 2025/32xxx/CVE-2025-32790.json create mode 100644 2025/32xxx/CVE-2025-32791.json create mode 100644 2025/32xxx/CVE-2025-32792.json create mode 100644 2025/32xxx/CVE-2025-32793.json create mode 100644 2025/32xxx/CVE-2025-32794.json create mode 100644 2025/32xxx/CVE-2025-32795.json create mode 100644 2025/32xxx/CVE-2025-32796.json create mode 100644 2025/32xxx/CVE-2025-32797.json create mode 100644 2025/32xxx/CVE-2025-32798.json create mode 100644 2025/32xxx/CVE-2025-32799.json create mode 100644 2025/32xxx/CVE-2025-32800.json create mode 100644 2025/32xxx/CVE-2025-32801.json create mode 100644 2025/32xxx/CVE-2025-32802.json create mode 100644 2025/32xxx/CVE-2025-32803.json create mode 100644 2025/3xxx/CVE-2025-3500.json create mode 100644 2025/3xxx/CVE-2025-3501.json diff --git a/2024/11xxx/CVE-2024-11218.json b/2024/11xxx/CVE-2024-11218.json index 17a0cd3daa0..1cf3d2ad577 100644 --- a/2024/11xxx/CVE-2024-11218.json +++ b/2024/11xxx/CVE-2024-11218.json @@ -324,7 +324,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.5-1.rhaos4.13.el8", + "version": "1:1.29.5-1.rhaos4.13.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -422,7 +422,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "3:4.4.1-33.rhaos4.15.el9", + "version": "3:4.4.1-33.rhaos4.15.el8", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -436,7 +436,7 @@ "x_cve_json_5_version_data": { "versions": [ { - "version": "1:1.29.5-1.rhaos4.15.el8", + "version": "1:1.29.5-1.rhaos4.15.el9", "lessThan": "*", "versionType": "rpm", "status": "unaffected" @@ -563,6 +563,20 @@ ], "defaultStatus": "affected" } + }, + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "418.94.202504021150-0", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } } ] } @@ -723,6 +737,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2025:2712" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:3577", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2025:3577" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-11218", "refsource": "MISC", diff --git a/2025/0xxx/CVE-2025-0624.json b/2025/0xxx/CVE-2025-0624.json index f93ca86d7a8..9c5b69747fe 100644 --- a/2025/0xxx/CVE-2025-0624.json +++ b/2025/0xxx/CVE-2025-0624.json @@ -370,6 +370,27 @@ } ] } + }, + { + "product_name": "Red Hat OpenShift Container Platform 4.18", + "version": { + "version_data": [ + { + "version_value": "not down converted", + "x_cve_json_5_version_data": { + "versions": [ + { + "version": "418.94.202504021150-0", + "lessThan": "*", + "versionType": "rpm", + "status": "unaffected" + } + ], + "defaultStatus": "affected" + } + } + ] + } } ] } @@ -439,6 +460,11 @@ "refsource": "MISC", "name": "https://access.redhat.com/errata/RHSA-2025:3396" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:3577", + "refsource": "MISC", + "name": "https://access.redhat.com/errata/RHSA-2025:3577" + }, { "url": "https://access.redhat.com/security/cve/CVE-2025-0624", "refsource": "MISC", diff --git a/2025/1xxx/CVE-2025-1677.json b/2025/1xxx/CVE-2025-1677.json index a9b968379b7..2bad416f6c3 100644 --- a/2025/1xxx/CVE-2025-1677.json +++ b/2025/1xxx/CVE-2025-1677.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-1677", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-770: Allocation of Resources Without Limits or Throttling", + "cweId": "CWE-770" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "0", + "version_value": "17.8.7" + }, + { + "version_affected": "<", + "version_name": "17.9", + "version_value": "17.9.6" + }, + { + "version_affected": "<", + "version_name": "17.10", + "version_value": "17.10.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/521117", + "refsource": "MISC", + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/521117" + }, + { + "url": "https://hackerone.com/reports/3004008", + "refsource": "MISC", + "name": "https://hackerone.com/reports/3004008" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Upgrade to version 17.10.4, 17.9.6 or 17.8.7" + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [pwnie](https://hackerone.com/pwnie) for reporting this vulnerability through our HackerOne bug bounty program" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/25xxx/CVE-2025-25197.json b/2025/25xxx/CVE-2025-25197.json index ec3eaa7fea8..b0f7795f40f 100644 --- a/2025/25xxx/CVE-2025-25197.json +++ b/2025/25xxx/CVE-2025-25197.json @@ -1,17 +1,95 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-25197", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Silverstripe Elemental extends a page type to swap the content area for a list of manageable elements to compose a page out of rather than a single text field. An elemental block can include an XSS payload, which can be executed when viewing the \"Content blocks in use\" report. The vulnerability is specific to that report and is a result of failure to cast input prior to including it in the grid field. This vulnerability is fixed in 5.3.12." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", + "cweId": "CWE-79" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "silverstripe", + "product": { + "product_data": [ + { + "product_name": "silverstripe-elemental", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": ">= 2.1.2, < 5.3.12" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/silverstripe/silverstripe-elemental/security/advisories/GHSA-x8xm-c7p8-2pj2", + "refsource": "MISC", + "name": "https://github.com/silverstripe/silverstripe-elemental/security/advisories/GHSA-x8xm-c7p8-2pj2" + }, + { + "url": "https://github.com/silverstripe/silverstripe-elemental/commit/34ff4ed498ccab94cc5f55ef9a56c37f491eda1d", + "refsource": "MISC", + "name": "https://github.com/silverstripe/silverstripe-elemental/commit/34ff4ed498ccab94cc5f55ef9a56c37f491eda1d" + }, + { + "url": "https://www.silverstripe.org/download/security-releases/CVE-2025-25197", + "refsource": "MISC", + "name": "https://www.silverstripe.org/download/security-releases/CVE-2025-25197" + } + ] + }, + "source": { + "advisory": "GHSA-x8xm-c7p8-2pj2", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.1" } ] } diff --git a/2025/27xxx/CVE-2025-27812.json b/2025/27xxx/CVE-2025-27812.json index 27b4866f5b1..4344e6d2545 100644 --- a/2025/27xxx/CVE-2025-27812.json +++ b/2025/27xxx/CVE-2025-27812.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-27812", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-27812", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "MSI Center before 2.0.52.0 allows TOCTOU Local Privilege Escalation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://csr.msi.com/global/product-security-advisories", + "url": "https://csr.msi.com/global/product-security-advisories" } ] } diff --git a/2025/27xxx/CVE-2025-27813.json b/2025/27xxx/CVE-2025-27813.json index 8893e9d8166..12227e5f09d 100644 --- a/2025/27xxx/CVE-2025-27813.json +++ b/2025/27xxx/CVE-2025-27813.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2025-27813", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2025-27813", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "MSI Center before 2.0.52.0 has Missing PE Signature Validation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://csr.msi.com/global/product-security-advisories", + "url": "https://csr.msi.com/global/product-security-advisories" } ] } diff --git a/2025/2xxx/CVE-2025-2408.json b/2025/2xxx/CVE-2025-2408.json index 49a62925f49..625b1860b4f 100644 --- a/2025/2xxx/CVE-2025-2408.json +++ b/2025/2xxx/CVE-2025-2408.json @@ -1,17 +1,109 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-2408", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cve@gitlab.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue has been discovered in GitLab CE/EE affecting all versions from 13.12 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions users could bypass IP access restrictions and view sensitive information." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-1220: Insufficient Granularity of Access Control", + "cweId": "CWE-1220" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "GitLab", + "product": { + "product_data": [ + { + "product_name": "GitLab", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "13.12", + "version_value": "17.8.7" + }, + { + "version_affected": "<", + "version_name": "17.9", + "version_value": "17.9.6" + }, + { + "version_affected": "<", + "version_name": "17.10", + "version_value": "17.10.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/525323", + "refsource": "MISC", + "name": "https://gitlab.com/gitlab-org/gitlab/-/issues/525323" + }, + { + "url": "https://hackerone.com/reports/3027775", + "refsource": "MISC", + "name": "https://hackerone.com/reports/3027775" + } + ] + }, + "solution": [ + { + "lang": "en", + "value": "Upgrade to versions 17.8.7, 17.9.6, 17.10.4 or above." + } + ], + "credits": [ + { + "lang": "en", + "value": "Thanks [rogerace](https://hackerone.com/rogerace) for reporting this vulnerability through our HackerOne bug bounty program" + } + ], + "impact": { + "cvss": [ + { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/32xxx/CVE-2025-32776.json b/2025/32xxx/CVE-2025-32776.json new file mode 100644 index 00000000000..15e230fd5ea --- /dev/null +++ b/2025/32xxx/CVE-2025-32776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32777.json b/2025/32xxx/CVE-2025-32777.json new file mode 100644 index 00000000000..3a8ab277ed7 --- /dev/null +++ b/2025/32xxx/CVE-2025-32777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32778.json b/2025/32xxx/CVE-2025-32778.json new file mode 100644 index 00000000000..3d76c911b75 --- /dev/null +++ b/2025/32xxx/CVE-2025-32778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32779.json b/2025/32xxx/CVE-2025-32779.json new file mode 100644 index 00000000000..aa3a85a3147 --- /dev/null +++ b/2025/32xxx/CVE-2025-32779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32780.json b/2025/32xxx/CVE-2025-32780.json new file mode 100644 index 00000000000..72158ae697f --- /dev/null +++ b/2025/32xxx/CVE-2025-32780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32781.json b/2025/32xxx/CVE-2025-32781.json new file mode 100644 index 00000000000..3e4ec551e47 --- /dev/null +++ b/2025/32xxx/CVE-2025-32781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32782.json b/2025/32xxx/CVE-2025-32782.json new file mode 100644 index 00000000000..55584780f62 --- /dev/null +++ b/2025/32xxx/CVE-2025-32782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32783.json b/2025/32xxx/CVE-2025-32783.json new file mode 100644 index 00000000000..be359ec0d32 --- /dev/null +++ b/2025/32xxx/CVE-2025-32783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32784.json b/2025/32xxx/CVE-2025-32784.json new file mode 100644 index 00000000000..fcfb4e2c3db --- /dev/null +++ b/2025/32xxx/CVE-2025-32784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32785.json b/2025/32xxx/CVE-2025-32785.json new file mode 100644 index 00000000000..eac612b9247 --- /dev/null +++ b/2025/32xxx/CVE-2025-32785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32786.json b/2025/32xxx/CVE-2025-32786.json new file mode 100644 index 00000000000..921be79359a --- /dev/null +++ b/2025/32xxx/CVE-2025-32786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32787.json b/2025/32xxx/CVE-2025-32787.json new file mode 100644 index 00000000000..bfebbe736ee --- /dev/null +++ b/2025/32xxx/CVE-2025-32787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32788.json b/2025/32xxx/CVE-2025-32788.json new file mode 100644 index 00000000000..d92d27d7f26 --- /dev/null +++ b/2025/32xxx/CVE-2025-32788.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32788", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32789.json b/2025/32xxx/CVE-2025-32789.json new file mode 100644 index 00000000000..b3517fef95c --- /dev/null +++ b/2025/32xxx/CVE-2025-32789.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32789", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32790.json b/2025/32xxx/CVE-2025-32790.json new file mode 100644 index 00000000000..0db2ca11526 --- /dev/null +++ b/2025/32xxx/CVE-2025-32790.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32790", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32791.json b/2025/32xxx/CVE-2025-32791.json new file mode 100644 index 00000000000..752cded14cc --- /dev/null +++ b/2025/32xxx/CVE-2025-32791.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32791", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32792.json b/2025/32xxx/CVE-2025-32792.json new file mode 100644 index 00000000000..25a5bbafdc3 --- /dev/null +++ b/2025/32xxx/CVE-2025-32792.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32792", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32793.json b/2025/32xxx/CVE-2025-32793.json new file mode 100644 index 00000000000..e5115bbfc21 --- /dev/null +++ b/2025/32xxx/CVE-2025-32793.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32793", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32794.json b/2025/32xxx/CVE-2025-32794.json new file mode 100644 index 00000000000..7f412b81f09 --- /dev/null +++ b/2025/32xxx/CVE-2025-32794.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32794", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32795.json b/2025/32xxx/CVE-2025-32795.json new file mode 100644 index 00000000000..3f7a14fd71c --- /dev/null +++ b/2025/32xxx/CVE-2025-32795.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32795", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32796.json b/2025/32xxx/CVE-2025-32796.json new file mode 100644 index 00000000000..2f376582ff9 --- /dev/null +++ b/2025/32xxx/CVE-2025-32796.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32796", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32797.json b/2025/32xxx/CVE-2025-32797.json new file mode 100644 index 00000000000..3981b7ab474 --- /dev/null +++ b/2025/32xxx/CVE-2025-32797.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32797", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32798.json b/2025/32xxx/CVE-2025-32798.json new file mode 100644 index 00000000000..f4f044ff462 --- /dev/null +++ b/2025/32xxx/CVE-2025-32798.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32798", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32799.json b/2025/32xxx/CVE-2025-32799.json new file mode 100644 index 00000000000..a00bd5c18a5 --- /dev/null +++ b/2025/32xxx/CVE-2025-32799.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32799", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32800.json b/2025/32xxx/CVE-2025-32800.json new file mode 100644 index 00000000000..44dda601666 --- /dev/null +++ b/2025/32xxx/CVE-2025-32800.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32800", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32801.json b/2025/32xxx/CVE-2025-32801.json new file mode 100644 index 00000000000..363fa6f00da --- /dev/null +++ b/2025/32xxx/CVE-2025-32801.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32801", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32802.json b/2025/32xxx/CVE-2025-32802.json new file mode 100644 index 00000000000..5338bca6c02 --- /dev/null +++ b/2025/32xxx/CVE-2025-32802.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32802", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32803.json b/2025/32xxx/CVE-2025-32803.json new file mode 100644 index 00000000000..182ec92fdb0 --- /dev/null +++ b/2025/32xxx/CVE-2025-32803.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-32803", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3500.json b/2025/3xxx/CVE-2025-3500.json new file mode 100644 index 00000000000..e3579b1c429 --- /dev/null +++ b/2025/3xxx/CVE-2025-3500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/3xxx/CVE-2025-3501.json b/2025/3xxx/CVE-2025-3501.json new file mode 100644 index 00000000000..1100d5044eb --- /dev/null +++ b/2025/3xxx/CVE-2025-3501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-3501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file