From 1903e2edf89b6e4c79d96b79cad5fb08c873b4b7 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 18 Mar 2021 14:01:04 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26233.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26234.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26235.json | 56 ++++++++++++++++++++++++--- 2021/26xxx/CVE-2021-26236.json | 5 +++ 2021/26xxx/CVE-2021-26237.json | 56 ++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28133.json | 71 +++++++++++++++++++++++++++++++--- 2021/28xxx/CVE-2021-28764.json | 18 +++++++++ 2021/28xxx/CVE-2021-28765.json | 18 +++++++++ 2021/28xxx/CVE-2021-28766.json | 18 +++++++++ 2021/28xxx/CVE-2021-28767.json | 18 +++++++++ 2021/28xxx/CVE-2021-28768.json | 18 +++++++++ 2021/28xxx/CVE-2021-28769.json | 18 +++++++++ 2021/28xxx/CVE-2021-28770.json | 18 +++++++++ 2021/28xxx/CVE-2021-28771.json | 18 +++++++++ 2021/28xxx/CVE-2021-28772.json | 18 +++++++++ 2021/28xxx/CVE-2021-28773.json | 18 +++++++++ 2021/28xxx/CVE-2021-28774.json | 18 +++++++++ 2021/28xxx/CVE-2021-28775.json | 18 +++++++++ 2021/28xxx/CVE-2021-28776.json | 18 +++++++++ 2021/28xxx/CVE-2021-28777.json | 18 +++++++++ 2021/28xxx/CVE-2021-28778.json | 18 +++++++++ 2021/28xxx/CVE-2021-28779.json | 18 +++++++++ 2021/28xxx/CVE-2021-28780.json | 18 +++++++++ 2021/28xxx/CVE-2021-28781.json | 18 +++++++++ 2021/28xxx/CVE-2021-28782.json | 18 +++++++++ 2021/28xxx/CVE-2021-28783.json | 18 +++++++++ 2021/28xxx/CVE-2021-28784.json | 18 +++++++++ 2021/28xxx/CVE-2021-28785.json | 18 +++++++++ 2021/28xxx/CVE-2021-28786.json | 18 +++++++++ 2021/28xxx/CVE-2021-28787.json | 18 +++++++++ 30 files changed, 702 insertions(+), 30 deletions(-) create mode 100644 2021/28xxx/CVE-2021-28764.json create mode 100644 2021/28xxx/CVE-2021-28765.json create mode 100644 2021/28xxx/CVE-2021-28766.json create mode 100644 2021/28xxx/CVE-2021-28767.json create mode 100644 2021/28xxx/CVE-2021-28768.json create mode 100644 2021/28xxx/CVE-2021-28769.json create mode 100644 2021/28xxx/CVE-2021-28770.json create mode 100644 2021/28xxx/CVE-2021-28771.json create mode 100644 2021/28xxx/CVE-2021-28772.json create mode 100644 2021/28xxx/CVE-2021-28773.json create mode 100644 2021/28xxx/CVE-2021-28774.json create mode 100644 2021/28xxx/CVE-2021-28775.json create mode 100644 2021/28xxx/CVE-2021-28776.json create mode 100644 2021/28xxx/CVE-2021-28777.json create mode 100644 2021/28xxx/CVE-2021-28778.json create mode 100644 2021/28xxx/CVE-2021-28779.json create mode 100644 2021/28xxx/CVE-2021-28780.json create mode 100644 2021/28xxx/CVE-2021-28781.json create mode 100644 2021/28xxx/CVE-2021-28782.json create mode 100644 2021/28xxx/CVE-2021-28783.json create mode 100644 2021/28xxx/CVE-2021-28784.json create mode 100644 2021/28xxx/CVE-2021-28785.json create mode 100644 2021/28xxx/CVE-2021-28786.json create mode 100644 2021/28xxx/CVE-2021-28787.json diff --git a/2021/26xxx/CVE-2021-26233.json b/2021/26xxx/CVE-2021-26233.json index d6fe690acf1..67570e4c04e 100644 --- a/2021/26xxx/CVE-2021-26233.json +++ b/2021/26xxx/CVE-2021-26233.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26233", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26233", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfcb, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26233-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26234.json b/2021/26xxx/CVE-2021-26234.json index 9df86a46368..fc6696fa469 100644 --- a/2021/26xxx/CVE-2021-26234.json +++ b/2021/26xxx/CVE-2021-26234.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26234", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26234", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d8a, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26234-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26235.json b/2021/26xxx/CVE-2021-26235.json index 25da56f8699..94cddf881c4 100644 --- a/2021/26xxx/CVE-2021-26235.json +++ b/2021/26xxx/CVE-2021-26235.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26235", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26235", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation near NULL at 0x005bdfc9, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26235-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/26xxx/CVE-2021-26236.json b/2021/26xxx/CVE-2021-26236.json index fdf04610ab8..5174ee3c0f4 100644 --- a/2021/26xxx/CVE-2021-26236.json +++ b/2021/26xxx/CVE-2021-26236.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://www.exploit-db.com/exploits/49660", "url": "https://www.exploit-db.com/exploits/49660" + }, + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/", + "url": "https://voidsec.com/advisories/cve-2021-26236-faststone-image-viewer-v-7-5-stack-based-buffer-overflow/" } ] } diff --git a/2021/26xxx/CVE-2021-26237.json b/2021/26xxx/CVE-2021-26237.json index b535db0464c..30f976ef4b7 100644 --- a/2021/26xxx/CVE-2021-26237.json +++ b/2021/26xxx/CVE-2021-26237.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-26237", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-26237", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "FastStone Image Viewer <= 7.5 is affected by a user mode write access violation at 0x00402d7d, triggered when a user opens or views a malformed CUR file that is mishandled by FSViewer.exe. Attackers could exploit this issue for a Denial of Service (DoS) or possibly to achieve code execution." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/", + "url": "https://voidsec.com/advisories/cve-2021-26237-faststone-image-viewer-v-7-5-user-mode-write-access-violation/" } ] } diff --git a/2021/28xxx/CVE-2021-28133.json b/2021/28xxx/CVE-2021-28133.json index 26c7909d3f1..cf89df2a532 100644 --- a/2021/28xxx/CVE-2021-28133.json +++ b/2021/28xxx/CVE-2021-28133.json @@ -1,17 +1,76 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-28133", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-28133", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Zoom through 5.5.4 sometimes allows attackers to read private information on a participant's screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt", + "refsource": "MISC", + "name": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-044.txt" + }, + { + "url": "https://zoom.us/trust/security/security-bulletin", + "refsource": "MISC", + "name": "https://zoom.us/trust/security/security-bulletin" + }, + { + "refsource": "MISC", + "name": "https://www.youtube.com/watch?v=SonmmgQlLzg", + "url": "https://www.youtube.com/watch?v=SonmmgQlLzg" + }, + { + "refsource": "MISC", + "name": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133", + "url": "https://www.syss.de/pentest-blog/syss-2020-044-sicherheitsproblem-in-screen-sharing-funktionalitaet-von-zoom-cve-2021-28133" } ] } diff --git a/2021/28xxx/CVE-2021-28764.json b/2021/28xxx/CVE-2021-28764.json new file mode 100644 index 00000000000..f34b0bb947c --- /dev/null +++ b/2021/28xxx/CVE-2021-28764.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28764", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28765.json b/2021/28xxx/CVE-2021-28765.json new file mode 100644 index 00000000000..2cbdc1253b5 --- /dev/null +++ b/2021/28xxx/CVE-2021-28765.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28765", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28766.json b/2021/28xxx/CVE-2021-28766.json new file mode 100644 index 00000000000..beebed6aa72 --- /dev/null +++ b/2021/28xxx/CVE-2021-28766.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28766", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28767.json b/2021/28xxx/CVE-2021-28767.json new file mode 100644 index 00000000000..47a3142070b --- /dev/null +++ b/2021/28xxx/CVE-2021-28767.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28767", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28768.json b/2021/28xxx/CVE-2021-28768.json new file mode 100644 index 00000000000..bdd89d933a4 --- /dev/null +++ b/2021/28xxx/CVE-2021-28768.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28768", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28769.json b/2021/28xxx/CVE-2021-28769.json new file mode 100644 index 00000000000..81a6053685c --- /dev/null +++ b/2021/28xxx/CVE-2021-28769.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28769", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28770.json b/2021/28xxx/CVE-2021-28770.json new file mode 100644 index 00000000000..a77c067c0ac --- /dev/null +++ b/2021/28xxx/CVE-2021-28770.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28770", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28771.json b/2021/28xxx/CVE-2021-28771.json new file mode 100644 index 00000000000..f64d8c3e0a0 --- /dev/null +++ b/2021/28xxx/CVE-2021-28771.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28771", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28772.json b/2021/28xxx/CVE-2021-28772.json new file mode 100644 index 00000000000..c5120423446 --- /dev/null +++ b/2021/28xxx/CVE-2021-28772.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28772", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28773.json b/2021/28xxx/CVE-2021-28773.json new file mode 100644 index 00000000000..e0cca9eea6d --- /dev/null +++ b/2021/28xxx/CVE-2021-28773.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28773", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28774.json b/2021/28xxx/CVE-2021-28774.json new file mode 100644 index 00000000000..c2d0e2ca92b --- /dev/null +++ b/2021/28xxx/CVE-2021-28774.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28774", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28775.json b/2021/28xxx/CVE-2021-28775.json new file mode 100644 index 00000000000..aedcba40783 --- /dev/null +++ b/2021/28xxx/CVE-2021-28775.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28775", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28776.json b/2021/28xxx/CVE-2021-28776.json new file mode 100644 index 00000000000..f904c62fd56 --- /dev/null +++ b/2021/28xxx/CVE-2021-28776.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28776", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28777.json b/2021/28xxx/CVE-2021-28777.json new file mode 100644 index 00000000000..d2f6b9883bf --- /dev/null +++ b/2021/28xxx/CVE-2021-28777.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28777", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28778.json b/2021/28xxx/CVE-2021-28778.json new file mode 100644 index 00000000000..7c1aa26a93e --- /dev/null +++ b/2021/28xxx/CVE-2021-28778.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28778", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28779.json b/2021/28xxx/CVE-2021-28779.json new file mode 100644 index 00000000000..5e0acfcc42a --- /dev/null +++ b/2021/28xxx/CVE-2021-28779.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28779", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28780.json b/2021/28xxx/CVE-2021-28780.json new file mode 100644 index 00000000000..d72b20a9cb6 --- /dev/null +++ b/2021/28xxx/CVE-2021-28780.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28780", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28781.json b/2021/28xxx/CVE-2021-28781.json new file mode 100644 index 00000000000..b1df5069e12 --- /dev/null +++ b/2021/28xxx/CVE-2021-28781.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28781", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28782.json b/2021/28xxx/CVE-2021-28782.json new file mode 100644 index 00000000000..7211a7f7d8d --- /dev/null +++ b/2021/28xxx/CVE-2021-28782.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28782", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28783.json b/2021/28xxx/CVE-2021-28783.json new file mode 100644 index 00000000000..8c980a15eb3 --- /dev/null +++ b/2021/28xxx/CVE-2021-28783.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28783", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28784.json b/2021/28xxx/CVE-2021-28784.json new file mode 100644 index 00000000000..b2d73722b07 --- /dev/null +++ b/2021/28xxx/CVE-2021-28784.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28784", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28785.json b/2021/28xxx/CVE-2021-28785.json new file mode 100644 index 00000000000..5fedea45d93 --- /dev/null +++ b/2021/28xxx/CVE-2021-28785.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28785", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28786.json b/2021/28xxx/CVE-2021-28786.json new file mode 100644 index 00000000000..826fcc37a61 --- /dev/null +++ b/2021/28xxx/CVE-2021-28786.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28786", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/28xxx/CVE-2021-28787.json b/2021/28xxx/CVE-2021-28787.json new file mode 100644 index 00000000000..d5de34be416 --- /dev/null +++ b/2021/28xxx/CVE-2021-28787.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-28787", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file