From 192003f5a204a8c6c1bb5dbead107b301837ce78 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 9 Feb 2021 23:00:59 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2021/26xxx/CVE-2021-26905.json | 7 +++- 2021/26xxx/CVE-2021-26952.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26953.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26954.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26955.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26956.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26957.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26958.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26959.json | 62 ++++++++++++++++++++++++++++++++++ 2021/26xxx/CVE-2021-26960.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26961.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26962.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26963.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26964.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26965.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26966.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26967.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26968.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26969.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26970.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26971.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26972.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26973.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26974.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26975.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26976.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26977.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26978.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26979.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26980.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26981.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26982.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26983.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26984.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26985.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26986.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26987.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26988.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26989.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26990.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26991.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26992.json | 18 ++++++++++ 2021/26xxx/CVE-2021-26993.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27027.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27028.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27029.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27030.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27031.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27032.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27033.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27034.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27035.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27036.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27037.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27038.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27039.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27040.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27041.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27042.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27043.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27044.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27045.json | 18 ++++++++++ 2021/27xxx/CVE-2021-27046.json | 18 ++++++++++ 63 files changed, 1474 insertions(+), 1 deletion(-) create mode 100644 2021/26xxx/CVE-2021-26952.json create mode 100644 2021/26xxx/CVE-2021-26953.json create mode 100644 2021/26xxx/CVE-2021-26954.json create mode 100644 2021/26xxx/CVE-2021-26955.json create mode 100644 2021/26xxx/CVE-2021-26956.json create mode 100644 2021/26xxx/CVE-2021-26957.json create mode 100644 2021/26xxx/CVE-2021-26958.json create mode 100644 2021/26xxx/CVE-2021-26959.json create mode 100644 2021/26xxx/CVE-2021-26960.json create mode 100644 2021/26xxx/CVE-2021-26961.json create mode 100644 2021/26xxx/CVE-2021-26962.json create mode 100644 2021/26xxx/CVE-2021-26963.json create mode 100644 2021/26xxx/CVE-2021-26964.json create mode 100644 2021/26xxx/CVE-2021-26965.json create mode 100644 2021/26xxx/CVE-2021-26966.json create mode 100644 2021/26xxx/CVE-2021-26967.json create mode 100644 2021/26xxx/CVE-2021-26968.json create mode 100644 2021/26xxx/CVE-2021-26969.json create mode 100644 2021/26xxx/CVE-2021-26970.json create mode 100644 2021/26xxx/CVE-2021-26971.json create mode 100644 2021/26xxx/CVE-2021-26972.json create mode 100644 2021/26xxx/CVE-2021-26973.json create mode 100644 2021/26xxx/CVE-2021-26974.json create mode 100644 2021/26xxx/CVE-2021-26975.json create mode 100644 2021/26xxx/CVE-2021-26976.json create mode 100644 2021/26xxx/CVE-2021-26977.json create mode 100644 2021/26xxx/CVE-2021-26978.json create mode 100644 2021/26xxx/CVE-2021-26979.json create mode 100644 2021/26xxx/CVE-2021-26980.json create mode 100644 2021/26xxx/CVE-2021-26981.json create mode 100644 2021/26xxx/CVE-2021-26982.json create mode 100644 2021/26xxx/CVE-2021-26983.json create mode 100644 2021/26xxx/CVE-2021-26984.json create mode 100644 2021/26xxx/CVE-2021-26985.json create mode 100644 2021/26xxx/CVE-2021-26986.json create mode 100644 2021/26xxx/CVE-2021-26987.json create mode 100644 2021/26xxx/CVE-2021-26988.json create mode 100644 2021/26xxx/CVE-2021-26989.json create mode 100644 2021/26xxx/CVE-2021-26990.json create mode 100644 2021/26xxx/CVE-2021-26991.json create mode 100644 2021/26xxx/CVE-2021-26992.json create mode 100644 2021/26xxx/CVE-2021-26993.json create mode 100644 2021/27xxx/CVE-2021-27027.json create mode 100644 2021/27xxx/CVE-2021-27028.json create mode 100644 2021/27xxx/CVE-2021-27029.json create mode 100644 2021/27xxx/CVE-2021-27030.json create mode 100644 2021/27xxx/CVE-2021-27031.json create mode 100644 2021/27xxx/CVE-2021-27032.json create mode 100644 2021/27xxx/CVE-2021-27033.json create mode 100644 2021/27xxx/CVE-2021-27034.json create mode 100644 2021/27xxx/CVE-2021-27035.json create mode 100644 2021/27xxx/CVE-2021-27036.json create mode 100644 2021/27xxx/CVE-2021-27037.json create mode 100644 2021/27xxx/CVE-2021-27038.json create mode 100644 2021/27xxx/CVE-2021-27039.json create mode 100644 2021/27xxx/CVE-2021-27040.json create mode 100644 2021/27xxx/CVE-2021-27041.json create mode 100644 2021/27xxx/CVE-2021-27042.json create mode 100644 2021/27xxx/CVE-2021-27043.json create mode 100644 2021/27xxx/CVE-2021-27044.json create mode 100644 2021/27xxx/CVE-2021-27045.json create mode 100644 2021/27xxx/CVE-2021-27046.json diff --git a/2021/26xxx/CVE-2021-26905.json b/2021/26xxx/CVE-2021-26905.json index 7bc7a3d179d..4359f168980 100644 --- a/2021/26xxx/CVE-2021-26905.json +++ b/2021/26xxx/CVE-2021-26905.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "1Password SCIM Bridge before 1.6.2 mishandles validation of requests for log files." + "value": "1Password SCIM Bridge before 1.6.2 mishandles validation of authenticated requests for log files, leading to disclosure of a TLS private key." } ] }, @@ -56,6 +56,11 @@ "url": "https://app-updates.agilebits.com/product_history/SCIM", "refsource": "MISC", "name": "https://app-updates.agilebits.com/product_history/SCIM" + }, + { + "refsource": "CONFIRM", + "name": "https://support.1password.com/kb/202102/", + "url": "https://support.1password.com/kb/202102/" } ] }, diff --git a/2021/26xxx/CVE-2021-26952.json b/2021/26xxx/CVE-2021-26952.json new file mode 100644 index 00000000000..618e39768f4 --- /dev/null +++ b/2021/26xxx/CVE-2021-26952.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26952", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0016.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0016.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26953.json b/2021/26xxx/CVE-2021-26953.json new file mode 100644 index 00000000000..17cdf5d39c4 --- /dev/null +++ b/2021/26xxx/CVE-2021-26953.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26953", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the postscript crate before 0.14.0 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via a user-provided Read implementation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0017.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0017.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26954.json b/2021/26xxx/CVE-2021-26954.json new file mode 100644 index 00000000000..af9607a2436 --- /dev/null +++ b/2021/26xxx/CVE-2021-26954.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26954", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the qwutils crate before 0.3.1 for Rust. When a Clone panic occurs, insert_slice_clone can perform a double drop." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0018.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0018.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26955.json b/2021/26xxx/CVE-2021-26955.json new file mode 100644 index 00000000000..85fc3eb0354 --- /dev/null +++ b/2021/26xxx/CVE-2021-26955.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26955", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because xcb::xproto::GetAtomNameReply::name() calls std::str::from_utf8_unchecked() on unvalidated bytes from an X server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26956.json b/2021/26xxx/CVE-2021-26956.json new file mode 100644 index 00000000000..01b490ba788 --- /dev/null +++ b/2021/26xxx/CVE-2021-26956.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26956", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because bytes from an X server can be interpreted as any data type returned by xcb::xproto::GetPropertyReply::value." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26957.json b/2021/26xxx/CVE-2021-26957.json new file mode 100644 index 00000000000..0b56cb69881 --- /dev/null +++ b/2021/26xxx/CVE-2021-26957.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26957", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because there is an out-of-bounds read in xcb::xproto::change_property(), as demonstrated by a format=32 T=u8 situation where out-of-bounds bytes are sent to an X server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26958.json b/2021/26xxx/CVE-2021-26958.json new file mode 100644 index 00000000000..5486b063a2d --- /dev/null +++ b/2021/26xxx/CVE-2021-26958.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26958", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the xcb crate through 2021-02-04 for Rust. It has a soundness violation because transmutation to the wrong type can happen after xcb::base::cast_event uses std::mem::transmute to return a reference to an arbitrary type." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0019.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26959.json b/2021/26xxx/CVE-2021-26959.json new file mode 100644 index 00000000000..22bd9ea4253 --- /dev/null +++ b/2021/26xxx/CVE-2021-26959.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2021-26959", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the hyper crate before 0.13.10 and 0.14.x before 0.14.3 for Rust. Request smuggling can occur when more than one Transfer-Encoding header is sent." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://rustsec.org/advisories/RUSTSEC-2021-0020.html", + "refsource": "MISC", + "name": "https://rustsec.org/advisories/RUSTSEC-2021-0020.html" + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26960.json b/2021/26xxx/CVE-2021-26960.json new file mode 100644 index 00000000000..e59ce8a373a --- /dev/null +++ b/2021/26xxx/CVE-2021-26960.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26960", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26961.json b/2021/26xxx/CVE-2021-26961.json new file mode 100644 index 00000000000..2e1a498f662 --- /dev/null +++ b/2021/26xxx/CVE-2021-26961.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26961", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26962.json b/2021/26xxx/CVE-2021-26962.json new file mode 100644 index 00000000000..fdd18f47d46 --- /dev/null +++ b/2021/26xxx/CVE-2021-26962.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26962", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26963.json b/2021/26xxx/CVE-2021-26963.json new file mode 100644 index 00000000000..aa58f447452 --- /dev/null +++ b/2021/26xxx/CVE-2021-26963.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26963", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26964.json b/2021/26xxx/CVE-2021-26964.json new file mode 100644 index 00000000000..d911acf08ab --- /dev/null +++ b/2021/26xxx/CVE-2021-26964.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26964", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26965.json b/2021/26xxx/CVE-2021-26965.json new file mode 100644 index 00000000000..44d107b6b36 --- /dev/null +++ b/2021/26xxx/CVE-2021-26965.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26965", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26966.json b/2021/26xxx/CVE-2021-26966.json new file mode 100644 index 00000000000..8d8394d0e17 --- /dev/null +++ b/2021/26xxx/CVE-2021-26966.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26966", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26967.json b/2021/26xxx/CVE-2021-26967.json new file mode 100644 index 00000000000..3a681675e1a --- /dev/null +++ b/2021/26xxx/CVE-2021-26967.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26967", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26968.json b/2021/26xxx/CVE-2021-26968.json new file mode 100644 index 00000000000..47e2a69345a --- /dev/null +++ b/2021/26xxx/CVE-2021-26968.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26968", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26969.json b/2021/26xxx/CVE-2021-26969.json new file mode 100644 index 00000000000..51feeeded1f --- /dev/null +++ b/2021/26xxx/CVE-2021-26969.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26969", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26970.json b/2021/26xxx/CVE-2021-26970.json new file mode 100644 index 00000000000..b8296d54062 --- /dev/null +++ b/2021/26xxx/CVE-2021-26970.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26970", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26971.json b/2021/26xxx/CVE-2021-26971.json new file mode 100644 index 00000000000..7519dd296c2 --- /dev/null +++ b/2021/26xxx/CVE-2021-26971.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26971", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26972.json b/2021/26xxx/CVE-2021-26972.json new file mode 100644 index 00000000000..1f71ccf11f3 --- /dev/null +++ b/2021/26xxx/CVE-2021-26972.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26972", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26973.json b/2021/26xxx/CVE-2021-26973.json new file mode 100644 index 00000000000..9d74059ca02 --- /dev/null +++ b/2021/26xxx/CVE-2021-26973.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26973", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26974.json b/2021/26xxx/CVE-2021-26974.json new file mode 100644 index 00000000000..0ceeab74ab1 --- /dev/null +++ b/2021/26xxx/CVE-2021-26974.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26974", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26975.json b/2021/26xxx/CVE-2021-26975.json new file mode 100644 index 00000000000..d4d05f4f8bf --- /dev/null +++ b/2021/26xxx/CVE-2021-26975.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26975", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26976.json b/2021/26xxx/CVE-2021-26976.json new file mode 100644 index 00000000000..12e928345cd --- /dev/null +++ b/2021/26xxx/CVE-2021-26976.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26976", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26977.json b/2021/26xxx/CVE-2021-26977.json new file mode 100644 index 00000000000..8a81c3eab20 --- /dev/null +++ b/2021/26xxx/CVE-2021-26977.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26977", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26978.json b/2021/26xxx/CVE-2021-26978.json new file mode 100644 index 00000000000..da4cb15b2f4 --- /dev/null +++ b/2021/26xxx/CVE-2021-26978.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26978", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26979.json b/2021/26xxx/CVE-2021-26979.json new file mode 100644 index 00000000000..0a12ae38199 --- /dev/null +++ b/2021/26xxx/CVE-2021-26979.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26979", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26980.json b/2021/26xxx/CVE-2021-26980.json new file mode 100644 index 00000000000..664711515a2 --- /dev/null +++ b/2021/26xxx/CVE-2021-26980.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26980", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26981.json b/2021/26xxx/CVE-2021-26981.json new file mode 100644 index 00000000000..01c6fd340a9 --- /dev/null +++ b/2021/26xxx/CVE-2021-26981.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26981", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26982.json b/2021/26xxx/CVE-2021-26982.json new file mode 100644 index 00000000000..890ba9e1c59 --- /dev/null +++ b/2021/26xxx/CVE-2021-26982.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26982", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26983.json b/2021/26xxx/CVE-2021-26983.json new file mode 100644 index 00000000000..2cfb51669b3 --- /dev/null +++ b/2021/26xxx/CVE-2021-26983.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26983", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26984.json b/2021/26xxx/CVE-2021-26984.json new file mode 100644 index 00000000000..181d85a528b --- /dev/null +++ b/2021/26xxx/CVE-2021-26984.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26984", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26985.json b/2021/26xxx/CVE-2021-26985.json new file mode 100644 index 00000000000..c66232a3ec5 --- /dev/null +++ b/2021/26xxx/CVE-2021-26985.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26985", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26986.json b/2021/26xxx/CVE-2021-26986.json new file mode 100644 index 00000000000..bc02ed54731 --- /dev/null +++ b/2021/26xxx/CVE-2021-26986.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26986", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26987.json b/2021/26xxx/CVE-2021-26987.json new file mode 100644 index 00000000000..3120dd662df --- /dev/null +++ b/2021/26xxx/CVE-2021-26987.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26987", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26988.json b/2021/26xxx/CVE-2021-26988.json new file mode 100644 index 00000000000..b3412d5a760 --- /dev/null +++ b/2021/26xxx/CVE-2021-26988.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26988", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26989.json b/2021/26xxx/CVE-2021-26989.json new file mode 100644 index 00000000000..70eba6af082 --- /dev/null +++ b/2021/26xxx/CVE-2021-26989.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26989", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26990.json b/2021/26xxx/CVE-2021-26990.json new file mode 100644 index 00000000000..1fd6eb898a8 --- /dev/null +++ b/2021/26xxx/CVE-2021-26990.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26990", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26991.json b/2021/26xxx/CVE-2021-26991.json new file mode 100644 index 00000000000..b8d931363dc --- /dev/null +++ b/2021/26xxx/CVE-2021-26991.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26991", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26992.json b/2021/26xxx/CVE-2021-26992.json new file mode 100644 index 00000000000..f41fed5e6c9 --- /dev/null +++ b/2021/26xxx/CVE-2021-26992.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26992", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/26xxx/CVE-2021-26993.json b/2021/26xxx/CVE-2021-26993.json new file mode 100644 index 00000000000..4355479f80a --- /dev/null +++ b/2021/26xxx/CVE-2021-26993.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-26993", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27027.json b/2021/27xxx/CVE-2021-27027.json new file mode 100644 index 00000000000..456eb2f43f1 --- /dev/null +++ b/2021/27xxx/CVE-2021-27027.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27027", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27028.json b/2021/27xxx/CVE-2021-27028.json new file mode 100644 index 00000000000..538f73ecc1c --- /dev/null +++ b/2021/27xxx/CVE-2021-27028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27029.json b/2021/27xxx/CVE-2021-27029.json new file mode 100644 index 00000000000..02fea6a0cff --- /dev/null +++ b/2021/27xxx/CVE-2021-27029.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27029", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27030.json b/2021/27xxx/CVE-2021-27030.json new file mode 100644 index 00000000000..e78a13ebd27 --- /dev/null +++ b/2021/27xxx/CVE-2021-27030.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27030", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27031.json b/2021/27xxx/CVE-2021-27031.json new file mode 100644 index 00000000000..7e8d3b62b6a --- /dev/null +++ b/2021/27xxx/CVE-2021-27031.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27031", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27032.json b/2021/27xxx/CVE-2021-27032.json new file mode 100644 index 00000000000..b0c513062a3 --- /dev/null +++ b/2021/27xxx/CVE-2021-27032.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27032", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27033.json b/2021/27xxx/CVE-2021-27033.json new file mode 100644 index 00000000000..92313e7c764 --- /dev/null +++ b/2021/27xxx/CVE-2021-27033.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27033", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27034.json b/2021/27xxx/CVE-2021-27034.json new file mode 100644 index 00000000000..7e9cd2b4b61 --- /dev/null +++ b/2021/27xxx/CVE-2021-27034.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27034", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27035.json b/2021/27xxx/CVE-2021-27035.json new file mode 100644 index 00000000000..07b8e691423 --- /dev/null +++ b/2021/27xxx/CVE-2021-27035.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27035", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27036.json b/2021/27xxx/CVE-2021-27036.json new file mode 100644 index 00000000000..44d47495d3a --- /dev/null +++ b/2021/27xxx/CVE-2021-27036.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27036", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27037.json b/2021/27xxx/CVE-2021-27037.json new file mode 100644 index 00000000000..e78e7a8c009 --- /dev/null +++ b/2021/27xxx/CVE-2021-27037.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27037", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27038.json b/2021/27xxx/CVE-2021-27038.json new file mode 100644 index 00000000000..70c5c3849bf --- /dev/null +++ b/2021/27xxx/CVE-2021-27038.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27038", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27039.json b/2021/27xxx/CVE-2021-27039.json new file mode 100644 index 00000000000..ffde0befba8 --- /dev/null +++ b/2021/27xxx/CVE-2021-27039.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27039", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27040.json b/2021/27xxx/CVE-2021-27040.json new file mode 100644 index 00000000000..3aee34996c6 --- /dev/null +++ b/2021/27xxx/CVE-2021-27040.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27040", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27041.json b/2021/27xxx/CVE-2021-27041.json new file mode 100644 index 00000000000..d861643371a --- /dev/null +++ b/2021/27xxx/CVE-2021-27041.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27041", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27042.json b/2021/27xxx/CVE-2021-27042.json new file mode 100644 index 00000000000..aaba4853647 --- /dev/null +++ b/2021/27xxx/CVE-2021-27042.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27042", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27043.json b/2021/27xxx/CVE-2021-27043.json new file mode 100644 index 00000000000..270de0118f9 --- /dev/null +++ b/2021/27xxx/CVE-2021-27043.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27043", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27044.json b/2021/27xxx/CVE-2021-27044.json new file mode 100644 index 00000000000..3a05871bc40 --- /dev/null +++ b/2021/27xxx/CVE-2021-27044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27045.json b/2021/27xxx/CVE-2021-27045.json new file mode 100644 index 00000000000..a35a0e5ea8c --- /dev/null +++ b/2021/27xxx/CVE-2021-27045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2021/27xxx/CVE-2021-27046.json b/2021/27xxx/CVE-2021-27046.json new file mode 100644 index 00000000000..cca1d8fa44c --- /dev/null +++ b/2021/27xxx/CVE-2021-27046.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-27046", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file