mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-19 17:32:41 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
4e1e3565da
commit
1f40642b8c
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "10419",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/10419/"
|
||||
},
|
||||
{
|
||||
"name": "http://www.mozilla.org/projects/security/known-vulnerabilities.html",
|
||||
"refsource": "CONFIRM",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://bugzilla.mozilla.org/show_bug.cgi?id=228176",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugzilla.mozilla.org/show_bug.cgi?id=228176"
|
||||
},
|
||||
{
|
||||
"name": "10419",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/10419/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,6 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "11815",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11815"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2004-6/advisory/",
|
||||
"refsource": "MISC",
|
||||
@ -61,11 +66,6 @@
|
||||
"name": "http://messenger.yahoo.com/security/update6.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://messenger.yahoo.com/security/update6.html"
|
||||
},
|
||||
{
|
||||
"name": "11815",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/11815"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2005-2/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2005-2/advisory/"
|
||||
},
|
||||
{
|
||||
"name": "13712",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/13712"
|
||||
},
|
||||
{
|
||||
"name": "http://secunia.com/secunia_research/2005-2/advisory/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secunia.com/secunia_research/2005-2/advisory/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.f-secure.com/security/fsc-2005-1.shtml",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.f-secure.com/security/fsc-2005-1.shtml"
|
||||
},
|
||||
{
|
||||
"name": "20050210 F-Secure AntiVirus Library Heap Overflow",
|
||||
"refsource": "ISS",
|
||||
"url": "http://xforce.iss.net/xforce/alerts/id/188"
|
||||
},
|
||||
{
|
||||
"name": "http://www.f-secure.com/security/fsc-2005-1.shtml",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.f-secure.com/security/fsc-2005-1.shtml"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,25 +52,25 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://bugs.kde.org/show_bug.cgi?id=96020",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.kde.org/show_bug.cgi?id=96020"
|
||||
},
|
||||
{
|
||||
"name": "[kmail-devel] 20050215 [Bug 96020] HTML Allows Spoofing of Emails Content",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://mail.kde.org/pipermail/kmail-devel/2005-February/015490.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/unixfocus/5GP0B0AFFE.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/unixfocus/5GP0B0AFFE.html"
|
||||
},
|
||||
{
|
||||
"name": "14925",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14925"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.kde.org/show_bug.cgi?id=96020",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.kde.org/show_bug.cgi?id=96020"
|
||||
},
|
||||
{
|
||||
"name": "http://www.securiteam.com/unixfocus/5GP0B0AFFE.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.securiteam.com/unixfocus/5GP0B0AFFE.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2005/02/mercuryboard-debug-information.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2005/02/mercuryboard-debug-information.html"
|
||||
},
|
||||
{
|
||||
"name": "13787",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "14284",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/14284"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2005/02/mercuryboard-debug-information.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2005/02/mercuryboard-debug-information.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=81894",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=81894"
|
||||
},
|
||||
{
|
||||
"name": "GLSA-200502-26",
|
||||
"refsource": "GENTOO",
|
||||
"url": "http://security.gentoo.org/glsa/glsa-200502-26.xml"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=81894",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=81894"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13372"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=323206",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=323206"
|
||||
},
|
||||
{
|
||||
"name": "15828",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/15828"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=323206",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=323206"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://cvs.horde.org/diff.php/accounts/docs/CHANGES?r1=1.1.1.1.2.15&r2=1.1.1.1.2.18&ty=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.horde.org/diff.php/accounts/docs/CHANGES?r1=1.1.1.1.2.15&r2=1.1.1.1.2.18&ty=h"
|
||||
},
|
||||
{
|
||||
"name": "15081",
|
||||
"refsource": "SECUNIA",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "[sork] 20050422 Accounts 2.1.2 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/sork/Week-of-Mon-20050418/002146.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.horde.org/diff.php/accounts/docs/CHANGES?r1=1.1.1.1.2.15&r2=1.1.1.1.2.18&ty=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.horde.org/diff.php/accounts/docs/CHANGES?r1=1.1.1.1.2.15&r2=1.1.1.1.2.18&ty=h"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://cvs.horde.org/diff.php/vacation/docs/CHANGES?r1=1.1.1.1.2.21&r2=1.1.1.1.2.26&ty=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.horde.org/diff.php/vacation/docs/CHANGES?r1=1.1.1.1.2.21&r2=1.1.1.1.2.26&ty=h"
|
||||
},
|
||||
{
|
||||
"name": "15073",
|
||||
"refsource": "SECUNIA",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "[sork] 20050422 Vacation 2.2.2 (final)",
|
||||
"refsource": "MLIST",
|
||||
"url": "http://lists.horde.org/archives/sork/Week-of-Mon-20050418/002148.html"
|
||||
},
|
||||
{
|
||||
"name": "http://cvs.horde.org/diff.php/vacation/docs/CHANGES?r1=1.1.1.1.2.21&r2=1.1.1.1.2.26&ty=h",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://cvs.horde.org/diff.php/vacation/docs/CHANGES?r1=1.1.1.1.2.21&r2=1.1.1.1.2.26&ty=h"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=323254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=323254"
|
||||
},
|
||||
{
|
||||
"name": "15830",
|
||||
"refsource": "OSVDB",
|
||||
@ -66,6 +61,11 @@
|
||||
"name": "15110",
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15110"
|
||||
},
|
||||
{
|
||||
"name": "http://sourceforge.net/project/shownotes.php?release_id=323254",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://sourceforge.net/project/shownotes.php?release_id=323254"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://remahl.se/david/vuln/004/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://remahl.se/david/vuln/004/"
|
||||
},
|
||||
{
|
||||
"name": "APPLE-SA-2005-05-03",
|
||||
"refsource": "APPLE",
|
||||
"url": "http://lists.apple.com/archives/security-announce/2005/May/msg00001.html"
|
||||
},
|
||||
{
|
||||
"name": "http://remahl.se/david/vuln/004/",
|
||||
"refsource": "MISC",
|
||||
"url": "http://remahl.se/david/vuln/004/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,15 +57,15 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13454"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cuteftp.com/gsftps/history.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.cuteftp.com/gsftps/history.asp"
|
||||
},
|
||||
{
|
||||
"name": "20050501 Remote buffer overflow in GlobalScape Secure FTP server 3.0.2",
|
||||
"refsource": "FULLDISC",
|
||||
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2005-04/0674.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.cuteftp.com/gsftps/history.asp",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.cuteftp.com/gsftps/history.asp"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15145"
|
||||
},
|
||||
{
|
||||
"name": "http://www.s9y.org/63.html#A9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.s9y.org/63.html#A9"
|
||||
},
|
||||
{
|
||||
"name": "15876",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/15876"
|
||||
},
|
||||
{
|
||||
"name": "http://www.s9y.org/63.html#A9",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.s9y.org/63.html#A9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,15 +52,15 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.gulftech.org/?node=research&article_id=00076-05172005",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00076-05172005"
|
||||
},
|
||||
{
|
||||
"name": "20050517 Help Center Live Vulnerabilities",
|
||||
"refsource": "BUGTRAQ",
|
||||
"url": "http://www.securityfocus.com/archive/1/398457"
|
||||
},
|
||||
{
|
||||
"name": "http://www.gulftech.org/?node=research&article_id=00076-05172005",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.gulftech.org/?node=research&article_id=00076-05172005"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15463"
|
||||
},
|
||||
{
|
||||
"name": "http://www.infobyte.com.ar/adv/ISR-10.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.infobyte.com.ar/adv/ISR-10.html"
|
||||
},
|
||||
{
|
||||
"name": "13703",
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13703"
|
||||
},
|
||||
{
|
||||
"name": "http://www.infobyte.com.ar/adv/ISR-10.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.infobyte.com.ar/adv/ISR-10.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -67,11 +67,6 @@
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16873"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html"
|
||||
},
|
||||
{
|
||||
"name": "16876",
|
||||
"refsource": "OSVDB",
|
||||
@ -111,6 +106,11 @@
|
||||
"name": "16877",
|
||||
"refsource": "OSVDB",
|
||||
"url": "http://www.osvdb.org/16877"
|
||||
},
|
||||
{
|
||||
"name": "http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://lostmon.blogspot.com/2005/05/bookreview-10-multiple-variable-xss.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.networksecurity.fi/advisories/windows-wmi-rpc.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.networksecurity.fi/advisories/windows-wmi-rpc.html"
|
||||
},
|
||||
{
|
||||
"name": "13801",
|
||||
"refsource": "BID",
|
||||
@ -71,6 +66,11 @@
|
||||
"name": "890196",
|
||||
"refsource": "MSKB",
|
||||
"url": "http://support.microsoft.com/kb/890196"
|
||||
},
|
||||
{
|
||||
"name": "http://www.networksecurity.fi/advisories/windows-wmi-rpc.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.networksecurity.fi/advisories/windows-wmi-rpc.html"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -57,11 +57,6 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13788"
|
||||
},
|
||||
{
|
||||
"name": "http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html"
|
||||
},
|
||||
{
|
||||
"name": "13790",
|
||||
"refsource": "BID",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15557"
|
||||
},
|
||||
{
|
||||
"name": "http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://connectivity.hummingbird.com/support/nc/exceed/lpdw_advisory.html"
|
||||
},
|
||||
{
|
||||
"name": "http://connectivity.hummingbird.com/support/nc/exceed/ftpd_advisory.html?cks=y",
|
||||
"refsource": "CONFIRM",
|
||||
|
@ -52,21 +52,11 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://www.usenetlinux.com/archive/index.php/t-411815.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.usenetlinux.com/archive/index.php/t-411815.html"
|
||||
},
|
||||
{
|
||||
"name": "DSA-787",
|
||||
"refsource": "DEBIAN",
|
||||
"url": "http://www.debian.org/security/2005/dsa-787"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sukria.net/packages/backup-manager/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sukria.net/packages/backup-manager/"
|
||||
},
|
||||
{
|
||||
"name": "13892",
|
||||
"refsource": "BID",
|
||||
@ -81,6 +71,16 @@
|
||||
"name": "1014124",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014124"
|
||||
},
|
||||
{
|
||||
"name": "http://www.usenetlinux.com/archive/index.php/t-411815.html",
|
||||
"refsource": "MISC",
|
||||
"url": "http://www.usenetlinux.com/archive/index.php/t-411815.html"
|
||||
},
|
||||
{
|
||||
"name": "http://www.sukria.net/packages/backup-manager/",
|
||||
"refsource": "CONFIRM",
|
||||
"url": "http://www.sukria.net/packages/backup-manager/"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -52,11 +52,6 @@
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=94473",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=94473"
|
||||
},
|
||||
{
|
||||
"name": "1014110",
|
||||
"refsource": "SECTRACK",
|
||||
@ -72,6 +67,11 @@
|
||||
"refsource": "BID",
|
||||
"url": "http://www.securityfocus.com/bid/13865"
|
||||
},
|
||||
{
|
||||
"name": "http://bugs.gentoo.org/show_bug.cgi?id=94473",
|
||||
"refsource": "MISC",
|
||||
"url": "http://bugs.gentoo.org/show_bug.cgi?id=94473"
|
||||
},
|
||||
{
|
||||
"name": "http://www.zataz.net/adviso/everybuddy-06062005.txt",
|
||||
"refsource": "MISC",
|
||||
|
@ -62,15 +62,15 @@
|
||||
"refsource": "SECUNIA",
|
||||
"url": "http://secunia.com/advisories/15600/"
|
||||
},
|
||||
{
|
||||
"name": "http://secwatch.org/advisories/secwatch/20050530_yapig.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secwatch.org/advisories/secwatch/20050530_yapig.txt"
|
||||
},
|
||||
{
|
||||
"name": "1014103",
|
||||
"refsource": "SECTRACK",
|
||||
"url": "http://securitytracker.com/id?1014103"
|
||||
},
|
||||
{
|
||||
"name": "http://secwatch.org/advisories/secwatch/20050530_yapig.txt",
|
||||
"refsource": "MISC",
|
||||
"url": "http://secwatch.org/advisories/secwatch/20050530_yapig.txt"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
18
2021/34xxx/CVE-2021-34701.json
Normal file
18
2021/34xxx/CVE-2021-34701.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34701",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34703.json
Normal file
18
2021/34xxx/CVE-2021-34703.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34703",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34705.json
Normal file
18
2021/34xxx/CVE-2021-34705.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34705",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34707.json
Normal file
18
2021/34xxx/CVE-2021-34707.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34707",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34715.json
Normal file
18
2021/34xxx/CVE-2021-34715.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34715",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34724.json
Normal file
18
2021/34xxx/CVE-2021-34724.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34724",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34732.json
Normal file
18
2021/34xxx/CVE-2021-34732.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34732",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34733.json
Normal file
18
2021/34xxx/CVE-2021-34733.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34733",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34736.json
Normal file
18
2021/34xxx/CVE-2021-34736.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34736",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34738.json
Normal file
18
2021/34xxx/CVE-2021-34738.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34738",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34740.json
Normal file
18
2021/34xxx/CVE-2021-34740.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34740",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34747.json
Normal file
18
2021/34xxx/CVE-2021-34747.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34747",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34750.json
Normal file
18
2021/34xxx/CVE-2021-34750.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34750",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34752.json
Normal file
18
2021/34xxx/CVE-2021-34752.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34752",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34753.json
Normal file
18
2021/34xxx/CVE-2021-34753.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34753",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34754.json
Normal file
18
2021/34xxx/CVE-2021-34754.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34754",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34756.json
Normal file
18
2021/34xxx/CVE-2021-34756.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34756",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34763.json
Normal file
18
2021/34xxx/CVE-2021-34763.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34763",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34772.json
Normal file
18
2021/34xxx/CVE-2021-34772.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34772",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34773.json
Normal file
18
2021/34xxx/CVE-2021-34773.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34773",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34774.json
Normal file
18
2021/34xxx/CVE-2021-34774.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34774",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34776.json
Normal file
18
2021/34xxx/CVE-2021-34776.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34776",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34781.json
Normal file
18
2021/34xxx/CVE-2021-34781.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34781",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34783.json
Normal file
18
2021/34xxx/CVE-2021-34783.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34783",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
18
2021/34xxx/CVE-2021-34788.json
Normal file
18
2021/34xxx/CVE-2021-34788.json
Normal file
@ -0,0 +1,18 @@
|
||||
{
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2021-34788",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
Loading…
x
Reference in New Issue
Block a user