From 02e1c3e8ab8dd4523747d9d61118e4c2c5ac6c3d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Feb 2021 18:00:46 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/18xxx/CVE-2020-18723.json | 61 ++++++++++++++++++++++++++++++---- 2020/18xxx/CVE-2020-18724.json | 61 ++++++++++++++++++++++++++++++---- 2020/23xxx/CVE-2020-23522.json | 5 +++ 2020/8xxx/CVE-2020-8588.json | 50 ++++++++++++++++++++++++++-- 2020/8xxx/CVE-2020-8589.json | 50 ++++++++++++++++++++++++++-- 2021/25xxx/CVE-2021-25274.json | 2 +- 2021/26xxx/CVE-2021-26603.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26604.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26605.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26606.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26607.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26608.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26609.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26610.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26611.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26612.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26613.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26614.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26615.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26616.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26617.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26618.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26619.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26620.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26621.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26622.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26623.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26624.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26625.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26626.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26627.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26628.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26629.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26630.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26631.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26632.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26633.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26634.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26635.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26636.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26637.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26638.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26639.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26640.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26641.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26642.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26643.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26644.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26645.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26646.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26647.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26648.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26649.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26650.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26651.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26652.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26653.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26654.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26655.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26656.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26657.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26658.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26659.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26660.json | 18 ++++++++++ 2021/3xxx/CVE-2021-3156.json | 5 +++ 65 files changed, 1259 insertions(+), 19 deletions(-) create mode 100644 2021/26xxx/CVE-2021-26603.json create mode 100644 2021/26xxx/CVE-2021-26604.json create mode 100644 2021/26xxx/CVE-2021-26605.json create mode 100644 2021/26xxx/CVE-2021-26606.json create mode 100644 2021/26xxx/CVE-2021-26607.json create mode 100644 2021/26xxx/CVE-2021-26608.json create mode 100644 2021/26xxx/CVE-2021-26609.json create mode 100644 2021/26xxx/CVE-2021-26610.json create mode 100644 2021/26xxx/CVE-2021-26611.json create mode 100644 2021/26xxx/CVE-2021-26612.json create mode 100644 2021/26xxx/CVE-2021-26613.json create mode 100644 2021/26xxx/CVE-2021-26614.json create mode 100644 2021/26xxx/CVE-2021-26615.json create mode 100644 2021/26xxx/CVE-2021-26616.json create mode 100644 2021/26xxx/CVE-2021-26617.json create mode 100644 2021/26xxx/CVE-2021-26618.json create mode 100644 2021/26xxx/CVE-2021-26619.json create mode 100644 2021/26xxx/CVE-2021-26620.json create mode 100644 2021/26xxx/CVE-2021-26621.json create mode 100644 2021/26xxx/CVE-2021-26622.json create mode 100644 2021/26xxx/CVE-2021-26623.json create mode 100644 2021/26xxx/CVE-2021-26624.json create mode 100644 2021/26xxx/CVE-2021-26625.json create mode 100644 2021/26xxx/CVE-2021-26626.json create mode 100644 2021/26xxx/CVE-2021-26627.json create mode 100644 2021/26xxx/CVE-2021-26628.json create mode 100644 2021/26xxx/CVE-2021-26629.json create mode 100644 2021/26xxx/CVE-2021-26630.json create mode 100644 2021/26xxx/CVE-2021-26631.json create mode 100644 2021/26xxx/CVE-2021-26632.json create mode 100644 2021/26xxx/CVE-2021-26633.json create mode 100644 2021/26xxx/CVE-2021-26634.json create mode 100644 2021/26xxx/CVE-2021-26635.json create mode 100644 2021/26xxx/CVE-2021-26636.json create mode 100644 2021/26xxx/CVE-2021-26637.json create mode 100644 2021/26xxx/CVE-2021-26638.json create mode 100644 2021/26xxx/CVE-2021-26639.json create mode 100644 2021/26xxx/CVE-2021-26640.json create mode 100644 2021/26xxx/CVE-2021-26641.json create mode 100644 2021/26xxx/CVE-2021-26642.json create mode 100644 2021/26xxx/CVE-2021-26643.json create mode 100644 2021/26xxx/CVE-2021-26644.json create mode 100644 2021/26xxx/CVE-2021-26645.json create mode 100644 2021/26xxx/CVE-2021-26646.json create mode 100644 2021/26xxx/CVE-2021-26647.json create mode 100644 2021/26xxx/CVE-2021-26648.json create mode 100644 2021/26xxx/CVE-2021-26649.json create mode 100644 2021/26xxx/CVE-2021-26650.json create mode 100644 2021/26xxx/CVE-2021-26651.json create mode 100644 2021/26xxx/CVE-2021-26652.json create mode 100644 2021/26xxx/CVE-2021-26653.json create mode 100644 2021/26xxx/CVE-2021-26654.json create mode 100644 2021/26xxx/CVE-2021-26655.json create mode 100644 2021/26xxx/CVE-2021-26656.json create mode 100644 2021/26xxx/CVE-2021-26657.json create mode 100644 2021/26xxx/CVE-2021-26658.json create mode 100644 2021/26xxx/CVE-2021-26659.json create mode 100644 2021/26xxx/CVE-2021-26660.json diff --git a/2020/18xxx/CVE-2020-18723.json b/2020/18xxx/CVE-2020-18723.json index 9fa8d554a7b..9f5497437a7 100644 --- a/2020/18xxx/CVE-2020-18723.json +++ b/2020/18xxx/CVE-2020-18723.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18723", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18723", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://kailashbohara.com.np/blog/2020/07/15/mdaemon-stored-xss", + "refsource": "MISC", + "name": "http://kailashbohara.com.np/blog/2020/07/15/mdaemon-stored-xss" + }, + { + "refsource": "MISC", + "name": "https://www.altn.com/Support/SecurityUpdate/MD082520_MDaemon_EN/", + "url": "https://www.altn.com/Support/SecurityUpdate/MD082520_MDaemon_EN/" } ] } diff --git a/2020/18xxx/CVE-2020-18724.json b/2020/18xxx/CVE-2020-18724.json index ef869db6f0b..fce582804b9 100644 --- a/2020/18xxx/CVE-2020-18724.json +++ b/2020/18xxx/CVE-2020-18724.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-18724", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-18724", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Authenticated stored cross-site scripting (XSS) in the contact name field in the distribution list of MDaemon webmail 19.5.5 allows an attacker to executes code and perform a XSS attack while opening a contact list." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://kailashbohara.com.np/blog/2020/07/15/mdaemon-stored-xss", + "refsource": "MISC", + "name": "http://kailashbohara.com.np/blog/2020/07/15/mdaemon-stored-xss" + }, + { + "refsource": "MISC", + "name": "https://www.altn.com/Support/SecurityUpdate/MD082520_MDaemon_EN/", + "url": "https://www.altn.com/Support/SecurityUpdate/MD082520_MDaemon_EN/" } ] } diff --git a/2020/23xxx/CVE-2020-23522.json b/2020/23xxx/CVE-2020-23522.json index 082f589cec4..ca2b9942ed1 100644 --- a/2020/23xxx/CVE-2020-23522.json +++ b/2020/23xxx/CVE-2020-23522.json @@ -56,6 +56,11 @@ "url": "https://github.com/pixelimity/pixelimity/issues/20", "refsource": "MISC", "name": "https://github.com/pixelimity/pixelimity/issues/20" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html", + "url": "http://packetstormsecurity.com/files/161276/Pixelimity-1.0-Cross-Site-Request-Forgery.html" } ] } diff --git a/2020/8xxx/CVE-2020-8588.json b/2020/8xxx/CVE-2020-8588.json index 0a65f45ab3a..078e6da9456 100644 --- a/2020/8xxx/CVE-2020-8588.json +++ b/2020/8xxx/CVE-2020-8588.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8588", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Clustered Data ONTAP", + "version": { + "version_data": [ + { + "version_value": "Versions prior to 9.3P20 and 9.5P15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Disclosure of sensitive information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210201-0001/", + "url": "https://security.netapp.com/advisory/ntap-20210201-0001/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Clustered Data ONTAP versions prior to 9.3P20 and 9.5P15 are susceptible to a vulnerability which could allow unauthorized tenant users to discover the existence of data on other Storage Virtual Machines (SVMs)." } ] } diff --git a/2020/8xxx/CVE-2020-8589.json b/2020/8xxx/CVE-2020-8589.json index 7581b588435..d61fd9be5b6 100644 --- a/2020/8xxx/CVE-2020-8589.json +++ b/2020/8xxx/CVE-2020-8589.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-8589", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-alert@netapp.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Clustered Data ONTAP", + "version": { + "version_data": [ + { + "version_value": "Versions prior to 9.3P20 and 9.5P15" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Disclosure of sensitive information" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.netapp.com/advisory/ntap-20210201-0002/", + "url": "https://security.netapp.com/advisory/ntap-20210201-0002/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Clustered Data ONTAP versions prior to 9.3P20 and 9.5P15 are susceptible to a vulnerability which could allow unauthorized tenant users to discover the names of other Storage Virtual Machines (SVMs) and filenames on those SVMs." } ] } diff --git a/2021/25xxx/CVE-2021-25274.json b/2021/25xxx/CVE-2021-25274.json index 8eb0ffb62db..f45546e0c34 100644 --- a/2021/25xxx/CVE-2021-25274.json +++ b/2021/25xxx/CVE-2021-25274.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner allowing remote arbitrary code execution as LocalSystem." + "value": "The Collector Service in SolarWinds Orion Platform before 2020.2.4 uses MSMQ (Microsoft Message Queue) and doesn't set permissions on its private queues. As a result, remote unauthenticated clients can send messages to TCP port 1801 that the Collector Service will process. Additionally, upon processing of such messages, the service deserializes them in insecure manner, allowing remote arbitrary code execution as LocalSystem." } ] }, diff --git a/2021/26xxx/CVE-2021-26603.json b/2021/26xxx/CVE-2021-26603.json new file mode 100644 index 00000000000..cbf9b5af316 --- /dev/null +++ b/2021/26xxx/CVE-2021-26603.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26603", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26604.json b/2021/26xxx/CVE-2021-26604.json new file mode 100644 index 00000000000..5521abd9223 --- /dev/null +++ b/2021/26xxx/CVE-2021-26604.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26604", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26605.json b/2021/26xxx/CVE-2021-26605.json new file mode 100644 index 00000000000..18416bd9a78 --- /dev/null +++ b/2021/26xxx/CVE-2021-26605.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26605", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26606.json b/2021/26xxx/CVE-2021-26606.json new file mode 100644 index 00000000000..89b15218fb0 --- /dev/null +++ b/2021/26xxx/CVE-2021-26606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26606", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26607.json b/2021/26xxx/CVE-2021-26607.json new file mode 100644 index 00000000000..426ef113908 --- /dev/null +++ b/2021/26xxx/CVE-2021-26607.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26607", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26608.json b/2021/26xxx/CVE-2021-26608.json new file mode 100644 index 00000000000..2fa88ade26e --- /dev/null +++ b/2021/26xxx/CVE-2021-26608.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26608", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26609.json b/2021/26xxx/CVE-2021-26609.json new file mode 100644 index 00000000000..0b5a9d68b34 --- /dev/null +++ b/2021/26xxx/CVE-2021-26609.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26609", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26610.json b/2021/26xxx/CVE-2021-26610.json new file mode 100644 index 00000000000..b67c9391708 --- /dev/null +++ b/2021/26xxx/CVE-2021-26610.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26610", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26611.json b/2021/26xxx/CVE-2021-26611.json new file mode 100644 index 00000000000..df93b1f3f98 --- /dev/null +++ b/2021/26xxx/CVE-2021-26611.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26611", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26612.json b/2021/26xxx/CVE-2021-26612.json new file mode 100644 index 00000000000..0c6d55e2dea --- /dev/null +++ b/2021/26xxx/CVE-2021-26612.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26612", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26613.json b/2021/26xxx/CVE-2021-26613.json new file mode 100644 index 00000000000..6af773a5207 --- /dev/null +++ b/2021/26xxx/CVE-2021-26613.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26613", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26614.json b/2021/26xxx/CVE-2021-26614.json new file mode 100644 index 00000000000..a47a9a8c919 --- /dev/null +++ b/2021/26xxx/CVE-2021-26614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26614", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26615.json b/2021/26xxx/CVE-2021-26615.json new file mode 100644 index 00000000000..a19a99133f9 --- /dev/null +++ b/2021/26xxx/CVE-2021-26615.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26615", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26616.json b/2021/26xxx/CVE-2021-26616.json new file mode 100644 index 00000000000..06b907dfa59 --- /dev/null +++ b/2021/26xxx/CVE-2021-26616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26616", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26617.json b/2021/26xxx/CVE-2021-26617.json new file mode 100644 index 00000000000..c877db5f09e --- /dev/null +++ b/2021/26xxx/CVE-2021-26617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26617", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26618.json b/2021/26xxx/CVE-2021-26618.json new file mode 100644 index 00000000000..0db54bbfa3e --- /dev/null +++ b/2021/26xxx/CVE-2021-26618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26618", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26619.json b/2021/26xxx/CVE-2021-26619.json new file mode 100644 index 00000000000..cada1fea7ee --- /dev/null +++ b/2021/26xxx/CVE-2021-26619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26619", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26620.json b/2021/26xxx/CVE-2021-26620.json new file mode 100644 index 00000000000..b7e2cee79be --- /dev/null +++ b/2021/26xxx/CVE-2021-26620.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26620", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26621.json b/2021/26xxx/CVE-2021-26621.json new file mode 100644 index 00000000000..fb96c40876e --- /dev/null +++ b/2021/26xxx/CVE-2021-26621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26621", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26622.json b/2021/26xxx/CVE-2021-26622.json new file mode 100644 index 00000000000..fd6ebfbfbd4 --- /dev/null +++ b/2021/26xxx/CVE-2021-26622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26622", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26623.json b/2021/26xxx/CVE-2021-26623.json new file mode 100644 index 00000000000..fe6c75d6ef5 --- /dev/null +++ b/2021/26xxx/CVE-2021-26623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26623", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26624.json b/2021/26xxx/CVE-2021-26624.json new file mode 100644 index 00000000000..884b386308f --- /dev/null +++ b/2021/26xxx/CVE-2021-26624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26624", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26625.json b/2021/26xxx/CVE-2021-26625.json new file mode 100644 index 00000000000..5bce52b25e9 --- /dev/null +++ b/2021/26xxx/CVE-2021-26625.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26625", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26626.json b/2021/26xxx/CVE-2021-26626.json new file mode 100644 index 00000000000..134f13e3a14 --- /dev/null +++ b/2021/26xxx/CVE-2021-26626.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26626", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26627.json b/2021/26xxx/CVE-2021-26627.json new file mode 100644 index 00000000000..a4d2a85ac17 --- /dev/null +++ b/2021/26xxx/CVE-2021-26627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26627", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26628.json b/2021/26xxx/CVE-2021-26628.json new file mode 100644 index 00000000000..b412bedb2b8 --- /dev/null +++ b/2021/26xxx/CVE-2021-26628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26628", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26629.json b/2021/26xxx/CVE-2021-26629.json new file mode 100644 index 00000000000..21605ebcbb9 --- /dev/null +++ b/2021/26xxx/CVE-2021-26629.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26629", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26630.json b/2021/26xxx/CVE-2021-26630.json new file mode 100644 index 00000000000..04bccb26a1a --- /dev/null +++ b/2021/26xxx/CVE-2021-26630.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26630", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26631.json b/2021/26xxx/CVE-2021-26631.json new file mode 100644 index 00000000000..13fb6b22915 --- /dev/null +++ b/2021/26xxx/CVE-2021-26631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26631", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26632.json b/2021/26xxx/CVE-2021-26632.json new file mode 100644 index 00000000000..1bcaae01365 --- /dev/null +++ b/2021/26xxx/CVE-2021-26632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26632", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26633.json b/2021/26xxx/CVE-2021-26633.json new file mode 100644 index 00000000000..ef20ccfee8e --- /dev/null +++ b/2021/26xxx/CVE-2021-26633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26633", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26634.json b/2021/26xxx/CVE-2021-26634.json new file mode 100644 index 00000000000..49576236bc8 --- /dev/null +++ b/2021/26xxx/CVE-2021-26634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26634", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26635.json b/2021/26xxx/CVE-2021-26635.json new file mode 100644 index 00000000000..95dc9ab3418 --- /dev/null +++ b/2021/26xxx/CVE-2021-26635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26635", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26636.json b/2021/26xxx/CVE-2021-26636.json new file mode 100644 index 00000000000..4bf428bb724 --- /dev/null +++ b/2021/26xxx/CVE-2021-26636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26636", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26637.json b/2021/26xxx/CVE-2021-26637.json new file mode 100644 index 00000000000..4cbd0127f02 --- /dev/null +++ b/2021/26xxx/CVE-2021-26637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26637", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26638.json b/2021/26xxx/CVE-2021-26638.json new file mode 100644 index 00000000000..77578ee5855 --- /dev/null +++ b/2021/26xxx/CVE-2021-26638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26638", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26639.json b/2021/26xxx/CVE-2021-26639.json new file mode 100644 index 00000000000..f203eec3da4 --- /dev/null +++ b/2021/26xxx/CVE-2021-26639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26639", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26640.json b/2021/26xxx/CVE-2021-26640.json new file mode 100644 index 00000000000..8d72a3e07b2 --- /dev/null +++ b/2021/26xxx/CVE-2021-26640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26640", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26641.json b/2021/26xxx/CVE-2021-26641.json new file mode 100644 index 00000000000..31d07264a31 --- /dev/null +++ b/2021/26xxx/CVE-2021-26641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26641", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26642.json b/2021/26xxx/CVE-2021-26642.json new file mode 100644 index 00000000000..7585db72763 --- /dev/null +++ b/2021/26xxx/CVE-2021-26642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26642", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26643.json b/2021/26xxx/CVE-2021-26643.json new file mode 100644 index 00000000000..084e8419d61 --- /dev/null +++ b/2021/26xxx/CVE-2021-26643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26643", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26644.json b/2021/26xxx/CVE-2021-26644.json new file mode 100644 index 00000000000..fc3c9788687 --- /dev/null +++ b/2021/26xxx/CVE-2021-26644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26644", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26645.json b/2021/26xxx/CVE-2021-26645.json new file mode 100644 index 00000000000..087918fab3c --- /dev/null +++ b/2021/26xxx/CVE-2021-26645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26645", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26646.json b/2021/26xxx/CVE-2021-26646.json new file mode 100644 index 00000000000..6b9b562fc89 --- /dev/null +++ b/2021/26xxx/CVE-2021-26646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26646", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26647.json b/2021/26xxx/CVE-2021-26647.json new file mode 100644 index 00000000000..52b78f7c9e1 --- /dev/null +++ b/2021/26xxx/CVE-2021-26647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26647", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26648.json b/2021/26xxx/CVE-2021-26648.json new file mode 100644 index 00000000000..97ad4d330ac --- /dev/null +++ b/2021/26xxx/CVE-2021-26648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26648", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26649.json b/2021/26xxx/CVE-2021-26649.json new file mode 100644 index 00000000000..bd7f96f10cb --- /dev/null +++ b/2021/26xxx/CVE-2021-26649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26649", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26650.json b/2021/26xxx/CVE-2021-26650.json new file mode 100644 index 00000000000..41689cac03b --- /dev/null +++ b/2021/26xxx/CVE-2021-26650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26650", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26651.json b/2021/26xxx/CVE-2021-26651.json new file mode 100644 index 00000000000..856624094b6 --- /dev/null +++ b/2021/26xxx/CVE-2021-26651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26651", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26652.json b/2021/26xxx/CVE-2021-26652.json new file mode 100644 index 00000000000..9da8e2ddc4a --- /dev/null +++ b/2021/26xxx/CVE-2021-26652.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26652", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26653.json b/2021/26xxx/CVE-2021-26653.json new file mode 100644 index 00000000000..9880849b33d --- /dev/null +++ b/2021/26xxx/CVE-2021-26653.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26653", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26654.json b/2021/26xxx/CVE-2021-26654.json new file mode 100644 index 00000000000..e870e63b747 --- /dev/null +++ b/2021/26xxx/CVE-2021-26654.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26654", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26655.json b/2021/26xxx/CVE-2021-26655.json new file mode 100644 index 00000000000..dfd74d08726 --- /dev/null +++ b/2021/26xxx/CVE-2021-26655.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26655", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26656.json b/2021/26xxx/CVE-2021-26656.json new file mode 100644 index 00000000000..2754fdb56bf --- /dev/null +++ b/2021/26xxx/CVE-2021-26656.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26656", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26657.json b/2021/26xxx/CVE-2021-26657.json new file mode 100644 index 00000000000..31c631b6713 --- /dev/null +++ b/2021/26xxx/CVE-2021-26657.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26657", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26658.json b/2021/26xxx/CVE-2021-26658.json new file mode 100644 index 00000000000..886edb6cc97 --- /dev/null +++ b/2021/26xxx/CVE-2021-26658.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26658", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26659.json b/2021/26xxx/CVE-2021-26659.json new file mode 100644 index 00000000000..07f7068eb8b --- /dev/null +++ b/2021/26xxx/CVE-2021-26659.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26659", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26660.json b/2021/26xxx/CVE-2021-26660.json new file mode 100644 index 00000000000..8e3288550eb --- /dev/null +++ b/2021/26xxx/CVE-2021-26660.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26660", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/3xxx/CVE-2021-3156.json b/2021/3xxx/CVE-2021-3156.json index d4f1ec5c7d2..38380e4ba9e 100644 --- a/2021/3xxx/CVE-2021-3156.json +++ b/2021/3xxx/CVE-2021-3156.json @@ -121,6 +121,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html", "url": "http://packetstormsecurity.com/files/161230/Sudo-Buffer-Overflow-Privilege-Escalation.html" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html", + "url": "http://packetstormsecurity.com/files/161270/Sudo-1.9.5p1-Buffer-Overflow-Privilege-Escalation.html" } ] }