From e154705576fb0e07be6eb73fdd2f333351900d1a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Apr 2025 21:01:11 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/30xxx/CVE-2025-30730.json | 72 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30731.json | 72 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30732.json | 72 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30733.json | 82 ++++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30735.json | 71 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30736.json | 82 ++++++++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30737.json | 71 +++++++++++++++++++++++++++-- 2025/30xxx/CVE-2025-30740.json | 72 +++++++++++++++++++++++++++-- 2025/31xxx/CVE-2025-31499.json | 63 ++++++++++++++++++++++++-- 2025/32xxx/CVE-2025-32021.json | 81 +++++++++++++++++++++++++++++++-- 2025/35xxx/CVE-2025-35004.json | 18 ++++++++ 2025/35xxx/CVE-2025-35005.json | 18 ++++++++ 2025/35xxx/CVE-2025-35006.json | 18 ++++++++ 2025/35xxx/CVE-2025-35232.json | 18 ++++++++ 2025/35xxx/CVE-2025-35233.json | 18 ++++++++ 2025/35xxx/CVE-2025-35234.json | 18 ++++++++ 2025/35xxx/CVE-2025-35235.json | 18 ++++++++ 2025/35xxx/CVE-2025-35236.json | 18 ++++++++ 2025/35xxx/CVE-2025-35237.json | 18 ++++++++ 2025/35xxx/CVE-2025-35238.json | 18 ++++++++ 2025/35xxx/CVE-2025-35239.json | 18 ++++++++ 2025/35xxx/CVE-2025-35240.json | 18 ++++++++ 2025/35xxx/CVE-2025-35241.json | 18 ++++++++ 2025/35xxx/CVE-2025-35242.json | 18 ++++++++ 2025/35xxx/CVE-2025-35243.json | 18 ++++++++ 2025/35xxx/CVE-2025-35244.json | 18 ++++++++ 2025/35xxx/CVE-2025-35266.json | 18 ++++++++ 2025/35xxx/CVE-2025-35267.json | 18 ++++++++ 2025/35xxx/CVE-2025-35268.json | 18 ++++++++ 2025/35xxx/CVE-2025-35269.json | 18 ++++++++ 2025/35xxx/CVE-2025-35270.json | 18 ++++++++ 2025/35xxx/CVE-2025-35271.json | 18 ++++++++ 2025/35xxx/CVE-2025-35272.json | 18 ++++++++ 2025/35xxx/CVE-2025-35273.json | 18 ++++++++ 2025/35xxx/CVE-2025-35274.json | 18 ++++++++ 2025/35xxx/CVE-2025-35275.json | 18 ++++++++ 2025/35xxx/CVE-2025-35276.json | 18 ++++++++ 2025/35xxx/CVE-2025-35277.json | 18 ++++++++ 2025/35xxx/CVE-2025-35278.json | 18 ++++++++ 2025/35xxx/CVE-2025-35279.json | 18 ++++++++ 2025/35xxx/CVE-2025-35280.json | 18 ++++++++ 2025/35xxx/CVE-2025-35281.json | 18 ++++++++ 2025/35xxx/CVE-2025-35282.json | 18 ++++++++ 2025/35xxx/CVE-2025-35283.json | 18 ++++++++ 2025/35xxx/CVE-2025-35284.json | 18 ++++++++ 2025/35xxx/CVE-2025-35285.json | 18 ++++++++ 2025/35xxx/CVE-2025-35286.json | 18 ++++++++ 2025/35xxx/CVE-2025-35287.json | 18 ++++++++ 2025/35xxx/CVE-2025-35288.json | 18 ++++++++ 2025/35xxx/CVE-2025-35289.json | 18 ++++++++ 2025/35xxx/CVE-2025-35290.json | 18 ++++++++ 2025/35xxx/CVE-2025-35291.json | 18 ++++++++ 2025/35xxx/CVE-2025-35292.json | 18 ++++++++ 2025/35xxx/CVE-2025-35293.json | 18 ++++++++ 2025/35xxx/CVE-2025-35294.json | 18 ++++++++ 2025/35xxx/CVE-2025-35295.json | 18 ++++++++ 2025/35xxx/CVE-2025-35296.json | 18 ++++++++ 2025/35xxx/CVE-2025-35297.json | 18 ++++++++ 2025/35xxx/CVE-2025-35298.json | 18 ++++++++ 2025/35xxx/CVE-2025-35299.json | 18 ++++++++ 2025/35xxx/CVE-2025-35300.json | 18 ++++++++ 2025/35xxx/CVE-2025-35301.json | 18 ++++++++ 2025/35xxx/CVE-2025-35302.json | 18 ++++++++ 2025/35xxx/CVE-2025-35303.json | 18 ++++++++ 2025/35xxx/CVE-2025-35304.json | 18 ++++++++ 2025/35xxx/CVE-2025-35305.json | 18 ++++++++ 2025/35xxx/CVE-2025-35306.json | 18 ++++++++ 2025/35xxx/CVE-2025-35307.json | 18 ++++++++ 2025/35xxx/CVE-2025-35308.json | 18 ++++++++ 2025/35xxx/CVE-2025-35309.json | 18 ++++++++ 2025/35xxx/CVE-2025-35310.json | 18 ++++++++ 2025/35xxx/CVE-2025-35311.json | 18 ++++++++ 2025/35xxx/CVE-2025-35312.json | 18 ++++++++ 2025/35xxx/CVE-2025-35313.json | 18 ++++++++ 2025/35xxx/CVE-2025-35314.json | 18 ++++++++ 2025/35xxx/CVE-2025-35315.json | 18 ++++++++ 2025/35xxx/CVE-2025-35316.json | 18 ++++++++ 2025/35xxx/CVE-2025-35317.json | 18 ++++++++ 2025/35xxx/CVE-2025-35318.json | 18 ++++++++ 2025/35xxx/CVE-2025-35319.json | 18 ++++++++ 2025/35xxx/CVE-2025-35320.json | 18 ++++++++ 2025/35xxx/CVE-2025-35321.json | 18 ++++++++ 2025/35xxx/CVE-2025-35322.json | 18 ++++++++ 2025/35xxx/CVE-2025-35323.json | 18 ++++++++ 2025/35xxx/CVE-2025-35324.json | 18 ++++++++ 2025/35xxx/CVE-2025-35325.json | 18 ++++++++ 2025/35xxx/CVE-2025-35326.json | 18 ++++++++ 2025/35xxx/CVE-2025-35327.json | 18 ++++++++ 2025/35xxx/CVE-2025-35328.json | 18 ++++++++ 2025/35xxx/CVE-2025-35329.json | 18 ++++++++ 2025/35xxx/CVE-2025-35330.json | 18 ++++++++ 2025/35xxx/CVE-2025-35331.json | 18 ++++++++ 2025/35xxx/CVE-2025-35332.json | 18 ++++++++ 2025/35xxx/CVE-2025-35333.json | 18 ++++++++ 2025/35xxx/CVE-2025-35334.json | 18 ++++++++ 2025/35xxx/CVE-2025-35335.json | 18 ++++++++ 2025/35xxx/CVE-2025-35336.json | 18 ++++++++ 2025/35xxx/CVE-2025-35337.json | 18 ++++++++ 2025/35xxx/CVE-2025-35338.json | 18 ++++++++ 2025/35xxx/CVE-2025-35339.json | 18 ++++++++ 100 files changed, 2318 insertions(+), 40 deletions(-) create mode 100644 2025/35xxx/CVE-2025-35004.json create mode 100644 2025/35xxx/CVE-2025-35005.json create mode 100644 2025/35xxx/CVE-2025-35006.json create mode 100644 2025/35xxx/CVE-2025-35232.json create mode 100644 2025/35xxx/CVE-2025-35233.json create mode 100644 2025/35xxx/CVE-2025-35234.json create mode 100644 2025/35xxx/CVE-2025-35235.json create mode 100644 2025/35xxx/CVE-2025-35236.json create mode 100644 2025/35xxx/CVE-2025-35237.json create mode 100644 2025/35xxx/CVE-2025-35238.json create mode 100644 2025/35xxx/CVE-2025-35239.json create mode 100644 2025/35xxx/CVE-2025-35240.json create mode 100644 2025/35xxx/CVE-2025-35241.json create mode 100644 2025/35xxx/CVE-2025-35242.json create mode 100644 2025/35xxx/CVE-2025-35243.json create mode 100644 2025/35xxx/CVE-2025-35244.json create mode 100644 2025/35xxx/CVE-2025-35266.json create mode 100644 2025/35xxx/CVE-2025-35267.json create mode 100644 2025/35xxx/CVE-2025-35268.json create mode 100644 2025/35xxx/CVE-2025-35269.json create mode 100644 2025/35xxx/CVE-2025-35270.json create mode 100644 2025/35xxx/CVE-2025-35271.json create mode 100644 2025/35xxx/CVE-2025-35272.json create mode 100644 2025/35xxx/CVE-2025-35273.json create mode 100644 2025/35xxx/CVE-2025-35274.json create mode 100644 2025/35xxx/CVE-2025-35275.json create mode 100644 2025/35xxx/CVE-2025-35276.json create mode 100644 2025/35xxx/CVE-2025-35277.json create mode 100644 2025/35xxx/CVE-2025-35278.json create mode 100644 2025/35xxx/CVE-2025-35279.json create mode 100644 2025/35xxx/CVE-2025-35280.json create mode 100644 2025/35xxx/CVE-2025-35281.json create mode 100644 2025/35xxx/CVE-2025-35282.json create mode 100644 2025/35xxx/CVE-2025-35283.json create mode 100644 2025/35xxx/CVE-2025-35284.json create mode 100644 2025/35xxx/CVE-2025-35285.json create mode 100644 2025/35xxx/CVE-2025-35286.json create mode 100644 2025/35xxx/CVE-2025-35287.json create mode 100644 2025/35xxx/CVE-2025-35288.json create mode 100644 2025/35xxx/CVE-2025-35289.json create mode 100644 2025/35xxx/CVE-2025-35290.json create mode 100644 2025/35xxx/CVE-2025-35291.json create mode 100644 2025/35xxx/CVE-2025-35292.json create mode 100644 2025/35xxx/CVE-2025-35293.json create mode 100644 2025/35xxx/CVE-2025-35294.json create mode 100644 2025/35xxx/CVE-2025-35295.json create mode 100644 2025/35xxx/CVE-2025-35296.json create mode 100644 2025/35xxx/CVE-2025-35297.json create mode 100644 2025/35xxx/CVE-2025-35298.json create mode 100644 2025/35xxx/CVE-2025-35299.json create mode 100644 2025/35xxx/CVE-2025-35300.json create mode 100644 2025/35xxx/CVE-2025-35301.json create mode 100644 2025/35xxx/CVE-2025-35302.json create mode 100644 2025/35xxx/CVE-2025-35303.json create mode 100644 2025/35xxx/CVE-2025-35304.json create mode 100644 2025/35xxx/CVE-2025-35305.json create mode 100644 2025/35xxx/CVE-2025-35306.json create mode 100644 2025/35xxx/CVE-2025-35307.json create mode 100644 2025/35xxx/CVE-2025-35308.json create mode 100644 2025/35xxx/CVE-2025-35309.json create mode 100644 2025/35xxx/CVE-2025-35310.json create mode 100644 2025/35xxx/CVE-2025-35311.json create mode 100644 2025/35xxx/CVE-2025-35312.json create mode 100644 2025/35xxx/CVE-2025-35313.json create mode 100644 2025/35xxx/CVE-2025-35314.json create mode 100644 2025/35xxx/CVE-2025-35315.json create mode 100644 2025/35xxx/CVE-2025-35316.json create mode 100644 2025/35xxx/CVE-2025-35317.json create mode 100644 2025/35xxx/CVE-2025-35318.json create mode 100644 2025/35xxx/CVE-2025-35319.json create mode 100644 2025/35xxx/CVE-2025-35320.json create mode 100644 2025/35xxx/CVE-2025-35321.json create mode 100644 2025/35xxx/CVE-2025-35322.json create mode 100644 2025/35xxx/CVE-2025-35323.json create mode 100644 2025/35xxx/CVE-2025-35324.json create mode 100644 2025/35xxx/CVE-2025-35325.json create mode 100644 2025/35xxx/CVE-2025-35326.json create mode 100644 2025/35xxx/CVE-2025-35327.json create mode 100644 2025/35xxx/CVE-2025-35328.json create mode 100644 2025/35xxx/CVE-2025-35329.json create mode 100644 2025/35xxx/CVE-2025-35330.json create mode 100644 2025/35xxx/CVE-2025-35331.json create mode 100644 2025/35xxx/CVE-2025-35332.json create mode 100644 2025/35xxx/CVE-2025-35333.json create mode 100644 2025/35xxx/CVE-2025-35334.json create mode 100644 2025/35xxx/CVE-2025-35335.json create mode 100644 2025/35xxx/CVE-2025-35336.json create mode 100644 2025/35xxx/CVE-2025-35337.json create mode 100644 2025/35xxx/CVE-2025-35338.json create mode 100644 2025/35xxx/CVE-2025-35339.json diff --git a/2025/30xxx/CVE-2025-30730.json b/2025/30xxx/CVE-2025-30730.json index 04f53a98905..16370b64445 100644 --- a/2025/30xxx/CVE-2025-30730.json +++ b/2025/30xxx/CVE-2025-30730.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30730", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.5-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Object Library. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Application Object Library." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Application Object Library", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "12.2.5", + "version_value": "12.2.14" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH" } ] } diff --git a/2025/30xxx/CVE-2025-30731.json b/2025/30xxx/CVE-2025-30731.json index a83b3fc287b..0652bf5a022 100644 --- a/2025/30xxx/CVE-2025-30731.json +++ b/2025/30xxx/CVE-2025-30731.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30731", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Oracle Applications Technology Stack product of Oracle E-Business Suite (component: Configuration). Supported versions that are affected are 12.2.3-12.2.14. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.1 Base Score 3.6 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Applications Technology Stack executes to compromise Oracle Applications Technology Stack. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data as well as unauthorized read access to a subset of Oracle Applications Technology Stack accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Applications Technology Stack", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "12.2.3", + "version_value": "12.2.14" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 3.6, + "baseSeverity": "LOW" } ] } diff --git a/2025/30xxx/CVE-2025-30732.json b/2025/30xxx/CVE-2025-30732.json index 7f504fd7913..5fd1e597a09 100644 --- a/2025/30xxx/CVE-2025-30732.json +++ b/2025/30xxx/CVE-2025-30732.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30732", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: Core). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Application Object Library", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "12.2.3", + "version_value": "12.2.14" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/30xxx/CVE-2025-30733.json b/2025/30xxx/CVE-2025-30733.json index 187bb7e2057..353eeac5a87 100644 --- a/2025/30xxx/CVE-2025-30733.json +++ b/2025/30xxx/CVE-2025-30733.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30733", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the RDBMS Listener component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise RDBMS Listener. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all RDBMS Listener accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Database Server", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "19.3", + "version_value": "19.26" + }, + { + "version_affected": "<=", + "version_name": "21.3", + "version_value": "21.17" + }, + { + "version_affected": "<=", + "version_name": "23.4", + "version_value": "23.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/30xxx/CVE-2025-30735.json b/2025/30xxx/CVE-2025-30735.json index 56f9cb4d0df..8b584ea1b73 100644 --- a/2025/30xxx/CVE-2025-30735.json +++ b/2025/30xxx/CVE-2025-30735.json @@ -1,17 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30735", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the PeopleSoft Enterprise CC Common Application Objects product of Oracle PeopleSoft (component: Page and Field Configuration). The supported version that is affected is 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise CC Common Application Objects. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all PeopleSoft Enterprise CC Common Application Objects accessible data as well as unauthorized access to critical data or complete access to all PeopleSoft Enterprise CC Common Application Objects accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "PeopleSoft Enterprise CC Common Application Objects", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "9.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH" } ] } diff --git a/2025/30xxx/CVE-2025-30736.json b/2025/30xxx/CVE-2025-30736.json index 6bffbd87c8f..3cafe0d6bfa 100644 --- a/2025/30xxx/CVE-2025-30736.json +++ b/2025/30xxx/CVE-2025-30736.json @@ -1,17 +1,91 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30736", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.26, 21.3-21.17 and 23.4-23.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as unauthorized access to critical data or complete access to all Java VM accessible data. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java VM accessible data as well as unauthorized access to critical data or complete access to all Java VM accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Database Server", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "19.3", + "version_value": "19.26" + }, + { + "version_affected": "<=", + "version_name": "21.3", + "version_value": "21.17" + }, + { + "version_affected": "<=", + "version_name": "23.4", + "version_value": "23.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH" } ] } diff --git a/2025/30xxx/CVE-2025-30737.json b/2025/30xxx/CVE-2025-30737.json index ca5f82ff130..27bce78db42 100644 --- a/2025/30xxx/CVE-2025-30737.json +++ b/2025/30xxx/CVE-2025-30737.json @@ -1,17 +1,80 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30737", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the Oracle Smart View for Office product of Oracle Hyperion (component: Core Smart View). The supported version that is affected is 24.200. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data. CVSS 3.1 Base Score 5.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Smart View for Office. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Smart View for Office accessible data as well as unauthorized access to critical data or complete access to all Oracle Smart View for Office accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "Oracle Smart View for Office", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "24.200" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/30xxx/CVE-2025-30740.json b/2025/30xxx/CVE-2025-30740.json index 02208bcc76a..b0b67961f18 100644 --- a/2025/30xxx/CVE-2025-30740.json +++ b/2025/30xxx/CVE-2025-30740.json @@ -1,17 +1,81 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-30740", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert_us@oracle.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are 9.2.0.0-9.2.9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data." + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Oracle Corporation", + "product": { + "product_data": [ + { + "product_name": "JD Edwards EnterpriseOne Tools", + "version": { + "version_data": [ + { + "version_affected": "<=", + "version_name": "9.2.0.0", + "version_value": "9.2.9.2" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://www.oracle.com/security-alerts/cpuapr2025.html", + "refsource": "MISC", + "name": "https://www.oracle.com/security-alerts/cpuapr2025.html" + } + ] + }, + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" } ] } diff --git a/2025/31xxx/CVE-2025-31499.json b/2025/31xxx/CVE-2025-31499.json index b45af3fa44b..8287e2bab3b 100644 --- a/2025/31xxx/CVE-2025-31499.json +++ b/2025/31xxx/CVE-2025-31499.json @@ -1,18 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-31499", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Jellyfin is an open source self hosted media server. Versions before 10.10.7 are vulnerable to argument injection in FFmpeg. This can be leveraged to possibly achieve remote code execution by anyone with credentials to a low-privileged user. This vulnerability was previously reported in CVE-2023-49096 and patched in version 10.8.13, but the patch can be bypassed. The original fix sanitizes some parameters to make injection impossible, but certain unsanitized parameters can still be used for argument injection. The same unauthenticated endpoints are vulnerable: /Videos//stream and /Videos//stream., likely alongside similar endpoints in AudioController. This argument injection can be exploited to achieve arbitrary file write, leading to possible remote code execution through the plugin system. While the unauthenticated endpoints are vulnerable, a valid itemId is required for exploitation and any authenticated attacker could easily retrieve a valid itemId to make the exploit work. This vulnerability is patched in version 10.10.7." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')", + "cweId": "CWE-88" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "jellyfin", + "product": { + "product_data": [ + { + "product_name": "jellyfin", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 10.10.7" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-2c3c-r7gp-q32m", + "refsource": "MISC", + "name": "https://github.com/jellyfin/jellyfin/security/advisories/GHSA-2c3c-r7gp-q32m" + }, + { + "url": "https://github.com/jellyfin/jellyfin/commit/79f3ce53257c5291887cd52d8ac735b5252c9a97", + "refsource": "MISC", + "name": "https://github.com/jellyfin/jellyfin/commit/79f3ce53257c5291887cd52d8ac735b5252c9a97" + } + ] + }, + "source": { + "advisory": "GHSA-2c3c-r7gp-q32m", + "discovery": "UNKNOWN" } } \ No newline at end of file diff --git a/2025/32xxx/CVE-2025-32021.json b/2025/32xxx/CVE-2025-32021.json index 64ea4de0513..dd129200fef 100644 --- a/2025/32xxx/CVE-2025-32021.json +++ b/2025/32xxx/CVE-2025-32021.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2025-32021", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Weblate is a web based localization tool. Prior to version 5.11, when creating a new component from an existing component that has a source code repository URL specified in settings, this URL is included in the client's URL parameters during the creation process. If, for example, the source code repository URL contains GitHub credentials, the confidential PAT and username are shown in plaintext and get saved into browser history. Moreover, if the request URL is logged, the credentials are written to logs in plaintext. If using Weblate official Docker image, nginx logs the URL and the token in plaintext. This issue is patched in version 5.11." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-598: Use of GET Request Method With Sensitive Query Strings", + "cweId": "CWE-598" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WeblateOrg", + "product": { + "product_data": [ + { + "product_name": "weblate", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 5.11" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-m67m-3p5g-cw9j", + "refsource": "MISC", + "name": "https://github.com/WeblateOrg/weblate/security/advisories/GHSA-m67m-3p5g-cw9j" + }, + { + "url": "https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.11", + "refsource": "MISC", + "name": "https://github.com/WeblateOrg/weblate/releases/tag/weblate-5.11" + } + ] + }, + "source": { + "advisory": "GHSA-m67m-3p5g-cw9j", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "HIGH", + "attackVector": "NETWORK", + "availabilityImpact": "NONE", + "baseScore": 2.2, + "baseSeverity": "LOW", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", + "version": "3.1" } ] } diff --git a/2025/35xxx/CVE-2025-35004.json b/2025/35xxx/CVE-2025-35004.json new file mode 100644 index 00000000000..59b9192f525 --- /dev/null +++ b/2025/35xxx/CVE-2025-35004.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35004", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35005.json b/2025/35xxx/CVE-2025-35005.json new file mode 100644 index 00000000000..3881447e678 --- /dev/null +++ b/2025/35xxx/CVE-2025-35005.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35005", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35006.json b/2025/35xxx/CVE-2025-35006.json new file mode 100644 index 00000000000..151f3716193 --- /dev/null +++ b/2025/35xxx/CVE-2025-35006.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35006", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35232.json b/2025/35xxx/CVE-2025-35232.json new file mode 100644 index 00000000000..f252185b8eb --- /dev/null +++ b/2025/35xxx/CVE-2025-35232.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35232", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35233.json b/2025/35xxx/CVE-2025-35233.json new file mode 100644 index 00000000000..785eca03806 --- /dev/null +++ b/2025/35xxx/CVE-2025-35233.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35233", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35234.json b/2025/35xxx/CVE-2025-35234.json new file mode 100644 index 00000000000..992130a0718 --- /dev/null +++ b/2025/35xxx/CVE-2025-35234.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35234", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35235.json b/2025/35xxx/CVE-2025-35235.json new file mode 100644 index 00000000000..b4586f99720 --- /dev/null +++ b/2025/35xxx/CVE-2025-35235.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35235", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35236.json b/2025/35xxx/CVE-2025-35236.json new file mode 100644 index 00000000000..ddcd5371f60 --- /dev/null +++ b/2025/35xxx/CVE-2025-35236.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35236", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35237.json b/2025/35xxx/CVE-2025-35237.json new file mode 100644 index 00000000000..fe38b44e0bd --- /dev/null +++ b/2025/35xxx/CVE-2025-35237.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35237", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35238.json b/2025/35xxx/CVE-2025-35238.json new file mode 100644 index 00000000000..b1de51bd69f --- /dev/null +++ b/2025/35xxx/CVE-2025-35238.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35238", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35239.json b/2025/35xxx/CVE-2025-35239.json new file mode 100644 index 00000000000..5da2fd1e174 --- /dev/null +++ b/2025/35xxx/CVE-2025-35239.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35239", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35240.json b/2025/35xxx/CVE-2025-35240.json new file mode 100644 index 00000000000..a37e8510ca7 --- /dev/null +++ b/2025/35xxx/CVE-2025-35240.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35240", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35241.json b/2025/35xxx/CVE-2025-35241.json new file mode 100644 index 00000000000..2b9541e3e0b --- /dev/null +++ b/2025/35xxx/CVE-2025-35241.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35241", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35242.json b/2025/35xxx/CVE-2025-35242.json new file mode 100644 index 00000000000..fd757945df6 --- /dev/null +++ b/2025/35xxx/CVE-2025-35242.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35242", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35243.json b/2025/35xxx/CVE-2025-35243.json new file mode 100644 index 00000000000..dc840a8575a --- /dev/null +++ b/2025/35xxx/CVE-2025-35243.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35243", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35244.json b/2025/35xxx/CVE-2025-35244.json new file mode 100644 index 00000000000..4b26da5e7ee --- /dev/null +++ b/2025/35xxx/CVE-2025-35244.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35244", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35266.json b/2025/35xxx/CVE-2025-35266.json new file mode 100644 index 00000000000..e7c477d9e2e --- /dev/null +++ b/2025/35xxx/CVE-2025-35266.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35266", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35267.json b/2025/35xxx/CVE-2025-35267.json new file mode 100644 index 00000000000..9087b12c1fc --- /dev/null +++ b/2025/35xxx/CVE-2025-35267.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35267", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35268.json b/2025/35xxx/CVE-2025-35268.json new file mode 100644 index 00000000000..7a7297661a3 --- /dev/null +++ b/2025/35xxx/CVE-2025-35268.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35268", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35269.json b/2025/35xxx/CVE-2025-35269.json new file mode 100644 index 00000000000..06c64fd6677 --- /dev/null +++ b/2025/35xxx/CVE-2025-35269.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35269", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35270.json b/2025/35xxx/CVE-2025-35270.json new file mode 100644 index 00000000000..646be177913 --- /dev/null +++ b/2025/35xxx/CVE-2025-35270.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35270", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35271.json b/2025/35xxx/CVE-2025-35271.json new file mode 100644 index 00000000000..25f65b452cf --- /dev/null +++ b/2025/35xxx/CVE-2025-35271.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35271", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35272.json b/2025/35xxx/CVE-2025-35272.json new file mode 100644 index 00000000000..d29a96022e6 --- /dev/null +++ b/2025/35xxx/CVE-2025-35272.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35272", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35273.json b/2025/35xxx/CVE-2025-35273.json new file mode 100644 index 00000000000..c2b5b7c724d --- /dev/null +++ b/2025/35xxx/CVE-2025-35273.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35273", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35274.json b/2025/35xxx/CVE-2025-35274.json new file mode 100644 index 00000000000..04bea3f87cd --- /dev/null +++ b/2025/35xxx/CVE-2025-35274.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35274", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35275.json b/2025/35xxx/CVE-2025-35275.json new file mode 100644 index 00000000000..12fe6abfee7 --- /dev/null +++ b/2025/35xxx/CVE-2025-35275.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35275", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35276.json b/2025/35xxx/CVE-2025-35276.json new file mode 100644 index 00000000000..91f52fa3fe5 --- /dev/null +++ b/2025/35xxx/CVE-2025-35276.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35276", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35277.json b/2025/35xxx/CVE-2025-35277.json new file mode 100644 index 00000000000..f328683615d --- /dev/null +++ b/2025/35xxx/CVE-2025-35277.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35277", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35278.json b/2025/35xxx/CVE-2025-35278.json new file mode 100644 index 00000000000..045b6556e51 --- /dev/null +++ b/2025/35xxx/CVE-2025-35278.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35278", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35279.json b/2025/35xxx/CVE-2025-35279.json new file mode 100644 index 00000000000..6ec45874e59 --- /dev/null +++ b/2025/35xxx/CVE-2025-35279.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35279", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35280.json b/2025/35xxx/CVE-2025-35280.json new file mode 100644 index 00000000000..3191273a562 --- /dev/null +++ b/2025/35xxx/CVE-2025-35280.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35280", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35281.json b/2025/35xxx/CVE-2025-35281.json new file mode 100644 index 00000000000..65d3546095e --- /dev/null +++ b/2025/35xxx/CVE-2025-35281.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35281", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35282.json b/2025/35xxx/CVE-2025-35282.json new file mode 100644 index 00000000000..7333c15cbd4 --- /dev/null +++ b/2025/35xxx/CVE-2025-35282.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35282", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35283.json b/2025/35xxx/CVE-2025-35283.json new file mode 100644 index 00000000000..bd8ab028a78 --- /dev/null +++ b/2025/35xxx/CVE-2025-35283.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35283", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35284.json b/2025/35xxx/CVE-2025-35284.json new file mode 100644 index 00000000000..1b5f37dab23 --- /dev/null +++ b/2025/35xxx/CVE-2025-35284.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35284", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35285.json b/2025/35xxx/CVE-2025-35285.json new file mode 100644 index 00000000000..f5016ae28f6 --- /dev/null +++ b/2025/35xxx/CVE-2025-35285.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35285", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35286.json b/2025/35xxx/CVE-2025-35286.json new file mode 100644 index 00000000000..4087c5c451a --- /dev/null +++ b/2025/35xxx/CVE-2025-35286.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35286", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35287.json b/2025/35xxx/CVE-2025-35287.json new file mode 100644 index 00000000000..c5c9c594fff --- /dev/null +++ b/2025/35xxx/CVE-2025-35287.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35287", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35288.json b/2025/35xxx/CVE-2025-35288.json new file mode 100644 index 00000000000..3cf8de80629 --- /dev/null +++ b/2025/35xxx/CVE-2025-35288.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35288", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35289.json b/2025/35xxx/CVE-2025-35289.json new file mode 100644 index 00000000000..3132abf678e --- /dev/null +++ b/2025/35xxx/CVE-2025-35289.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35289", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35290.json b/2025/35xxx/CVE-2025-35290.json new file mode 100644 index 00000000000..90cefc5585b --- /dev/null +++ b/2025/35xxx/CVE-2025-35290.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35290", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35291.json b/2025/35xxx/CVE-2025-35291.json new file mode 100644 index 00000000000..6c569c72378 --- /dev/null +++ b/2025/35xxx/CVE-2025-35291.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35291", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35292.json b/2025/35xxx/CVE-2025-35292.json new file mode 100644 index 00000000000..9b0da84a45c --- /dev/null +++ b/2025/35xxx/CVE-2025-35292.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35292", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35293.json b/2025/35xxx/CVE-2025-35293.json new file mode 100644 index 00000000000..201306c3f30 --- /dev/null +++ b/2025/35xxx/CVE-2025-35293.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35293", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35294.json b/2025/35xxx/CVE-2025-35294.json new file mode 100644 index 00000000000..8d114d630e6 --- /dev/null +++ b/2025/35xxx/CVE-2025-35294.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35294", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35295.json b/2025/35xxx/CVE-2025-35295.json new file mode 100644 index 00000000000..3f2054d3d9a --- /dev/null +++ b/2025/35xxx/CVE-2025-35295.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35295", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35296.json b/2025/35xxx/CVE-2025-35296.json new file mode 100644 index 00000000000..6de666b1adf --- /dev/null +++ b/2025/35xxx/CVE-2025-35296.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35296", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35297.json b/2025/35xxx/CVE-2025-35297.json new file mode 100644 index 00000000000..0178b247b55 --- /dev/null +++ b/2025/35xxx/CVE-2025-35297.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35297", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35298.json b/2025/35xxx/CVE-2025-35298.json new file mode 100644 index 00000000000..f02e746f039 --- /dev/null +++ b/2025/35xxx/CVE-2025-35298.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35298", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35299.json b/2025/35xxx/CVE-2025-35299.json new file mode 100644 index 00000000000..032a91a20d3 --- /dev/null +++ b/2025/35xxx/CVE-2025-35299.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35299", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35300.json b/2025/35xxx/CVE-2025-35300.json new file mode 100644 index 00000000000..51dfbe3e2e9 --- /dev/null +++ b/2025/35xxx/CVE-2025-35300.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35300", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35301.json b/2025/35xxx/CVE-2025-35301.json new file mode 100644 index 00000000000..705297ae0a0 --- /dev/null +++ b/2025/35xxx/CVE-2025-35301.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35301", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35302.json b/2025/35xxx/CVE-2025-35302.json new file mode 100644 index 00000000000..209c7d79999 --- /dev/null +++ b/2025/35xxx/CVE-2025-35302.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35302", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35303.json b/2025/35xxx/CVE-2025-35303.json new file mode 100644 index 00000000000..1a8635ac719 --- /dev/null +++ b/2025/35xxx/CVE-2025-35303.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35303", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35304.json b/2025/35xxx/CVE-2025-35304.json new file mode 100644 index 00000000000..04b7e9d6915 --- /dev/null +++ b/2025/35xxx/CVE-2025-35304.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35304", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35305.json b/2025/35xxx/CVE-2025-35305.json new file mode 100644 index 00000000000..b9b6fc01c47 --- /dev/null +++ b/2025/35xxx/CVE-2025-35305.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35305", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35306.json b/2025/35xxx/CVE-2025-35306.json new file mode 100644 index 00000000000..030aa3d2f92 --- /dev/null +++ b/2025/35xxx/CVE-2025-35306.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35306", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35307.json b/2025/35xxx/CVE-2025-35307.json new file mode 100644 index 00000000000..8ccf1a28360 --- /dev/null +++ b/2025/35xxx/CVE-2025-35307.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35307", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35308.json b/2025/35xxx/CVE-2025-35308.json new file mode 100644 index 00000000000..c94bd83c85e --- /dev/null +++ b/2025/35xxx/CVE-2025-35308.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35308", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35309.json b/2025/35xxx/CVE-2025-35309.json new file mode 100644 index 00000000000..d771b2f82ca --- /dev/null +++ b/2025/35xxx/CVE-2025-35309.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35309", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35310.json b/2025/35xxx/CVE-2025-35310.json new file mode 100644 index 00000000000..501f76034f5 --- /dev/null +++ b/2025/35xxx/CVE-2025-35310.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35310", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35311.json b/2025/35xxx/CVE-2025-35311.json new file mode 100644 index 00000000000..47cd921e078 --- /dev/null +++ b/2025/35xxx/CVE-2025-35311.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35311", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35312.json b/2025/35xxx/CVE-2025-35312.json new file mode 100644 index 00000000000..de6fc39551e --- /dev/null +++ b/2025/35xxx/CVE-2025-35312.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35312", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35313.json b/2025/35xxx/CVE-2025-35313.json new file mode 100644 index 00000000000..eb23d4ad909 --- /dev/null +++ b/2025/35xxx/CVE-2025-35313.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35313", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35314.json b/2025/35xxx/CVE-2025-35314.json new file mode 100644 index 00000000000..fe716a2bb90 --- /dev/null +++ b/2025/35xxx/CVE-2025-35314.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35314", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35315.json b/2025/35xxx/CVE-2025-35315.json new file mode 100644 index 00000000000..fff22af712c --- /dev/null +++ b/2025/35xxx/CVE-2025-35315.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35315", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35316.json b/2025/35xxx/CVE-2025-35316.json new file mode 100644 index 00000000000..bc2d9054268 --- /dev/null +++ b/2025/35xxx/CVE-2025-35316.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35316", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35317.json b/2025/35xxx/CVE-2025-35317.json new file mode 100644 index 00000000000..4f47781257c --- /dev/null +++ b/2025/35xxx/CVE-2025-35317.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35317", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35318.json b/2025/35xxx/CVE-2025-35318.json new file mode 100644 index 00000000000..3415f4597ff --- /dev/null +++ b/2025/35xxx/CVE-2025-35318.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35318", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35319.json b/2025/35xxx/CVE-2025-35319.json new file mode 100644 index 00000000000..03e22789807 --- /dev/null +++ b/2025/35xxx/CVE-2025-35319.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35319", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35320.json b/2025/35xxx/CVE-2025-35320.json new file mode 100644 index 00000000000..8068da512f9 --- /dev/null +++ b/2025/35xxx/CVE-2025-35320.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35320", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35321.json b/2025/35xxx/CVE-2025-35321.json new file mode 100644 index 00000000000..626f5b5a774 --- /dev/null +++ b/2025/35xxx/CVE-2025-35321.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35321", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35322.json b/2025/35xxx/CVE-2025-35322.json new file mode 100644 index 00000000000..60eef009042 --- /dev/null +++ b/2025/35xxx/CVE-2025-35322.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35322", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35323.json b/2025/35xxx/CVE-2025-35323.json new file mode 100644 index 00000000000..8922a59a375 --- /dev/null +++ b/2025/35xxx/CVE-2025-35323.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35323", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35324.json b/2025/35xxx/CVE-2025-35324.json new file mode 100644 index 00000000000..645610b54f0 --- /dev/null +++ b/2025/35xxx/CVE-2025-35324.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35324", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35325.json b/2025/35xxx/CVE-2025-35325.json new file mode 100644 index 00000000000..3fc820debc7 --- /dev/null +++ b/2025/35xxx/CVE-2025-35325.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35325", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35326.json b/2025/35xxx/CVE-2025-35326.json new file mode 100644 index 00000000000..4c0a29fcfc5 --- /dev/null +++ b/2025/35xxx/CVE-2025-35326.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35326", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35327.json b/2025/35xxx/CVE-2025-35327.json new file mode 100644 index 00000000000..0f6384b02c9 --- /dev/null +++ b/2025/35xxx/CVE-2025-35327.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35327", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35328.json b/2025/35xxx/CVE-2025-35328.json new file mode 100644 index 00000000000..5c99ec12c3b --- /dev/null +++ b/2025/35xxx/CVE-2025-35328.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35328", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35329.json b/2025/35xxx/CVE-2025-35329.json new file mode 100644 index 00000000000..4efd465ba50 --- /dev/null +++ b/2025/35xxx/CVE-2025-35329.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35329", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35330.json b/2025/35xxx/CVE-2025-35330.json new file mode 100644 index 00000000000..dd9889cde45 --- /dev/null +++ b/2025/35xxx/CVE-2025-35330.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35330", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35331.json b/2025/35xxx/CVE-2025-35331.json new file mode 100644 index 00000000000..3c305eb770d --- /dev/null +++ b/2025/35xxx/CVE-2025-35331.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35331", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35332.json b/2025/35xxx/CVE-2025-35332.json new file mode 100644 index 00000000000..981a16669dc --- /dev/null +++ b/2025/35xxx/CVE-2025-35332.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35332", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35333.json b/2025/35xxx/CVE-2025-35333.json new file mode 100644 index 00000000000..c0814fa8e0c --- /dev/null +++ b/2025/35xxx/CVE-2025-35333.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35333", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35334.json b/2025/35xxx/CVE-2025-35334.json new file mode 100644 index 00000000000..7675b0106be --- /dev/null +++ b/2025/35xxx/CVE-2025-35334.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35334", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35335.json b/2025/35xxx/CVE-2025-35335.json new file mode 100644 index 00000000000..dd5a4f4ba5b --- /dev/null +++ b/2025/35xxx/CVE-2025-35335.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35335", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35336.json b/2025/35xxx/CVE-2025-35336.json new file mode 100644 index 00000000000..f3718b16622 --- /dev/null +++ b/2025/35xxx/CVE-2025-35336.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35336", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35337.json b/2025/35xxx/CVE-2025-35337.json new file mode 100644 index 00000000000..64ea75d740b --- /dev/null +++ b/2025/35xxx/CVE-2025-35337.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35337", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35338.json b/2025/35xxx/CVE-2025-35338.json new file mode 100644 index 00000000000..041f7ca3d3d --- /dev/null +++ b/2025/35xxx/CVE-2025-35338.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35338", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/35xxx/CVE-2025-35339.json b/2025/35xxx/CVE-2025-35339.json new file mode 100644 index 00000000000..7387e0859fc --- /dev/null +++ b/2025/35xxx/CVE-2025-35339.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-35339", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file