diff --git a/2018/11xxx/CVE-2018-11005.json b/2018/11xxx/CVE-2018-11005.json index 8e14349e101..c88a802dcde 100644 --- a/2018/11xxx/CVE-2018-11005.json +++ b/2018/11xxx/CVE-2018-11005.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11005", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11006.json b/2018/11xxx/CVE-2018-11006.json index 78374bd18a8..3a0b040c603 100644 --- a/2018/11xxx/CVE-2018-11006.json +++ b/2018/11xxx/CVE-2018-11006.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11006", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11007.json b/2018/11xxx/CVE-2018-11007.json index 99062b65554..12b4975f25a 100644 --- a/2018/11xxx/CVE-2018-11007.json +++ b/2018/11xxx/CVE-2018-11007.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11007", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Memory Leak issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11008.json b/2018/11xxx/CVE-2018-11008.json index ae7946a012d..82fc1e42801 100644 --- a/2018/11xxx/CVE-2018-11008.json +++ b/2018/11xxx/CVE-2018-11008.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11008", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An Incorrect Access Control issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11009.json b/2018/11xxx/CVE-2018-11009.json index 4d2021591b4..d79ebeb0962 100644 --- a/2018/11xxx/CVE-2018-11009.json +++ b/2018/11xxx/CVE-2018-11009.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11009", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11010.json b/2018/11xxx/CVE-2018-11010.json index f4c6cf7b9bd..fd0d4dbeb14 100644 --- a/2018/11xxx/CVE-2018-11010.json +++ b/2018/11xxx/CVE-2018-11010.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11010", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A Buffer Overflow issue was discovered in K7Computing K7AntiVirus Premium 15.01.00.53." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/11xxx/CVE-2018-11246.json b/2018/11xxx/CVE-2018-11246.json index bf0d1c915f7..cedaf1f26cd 100644 --- a/2018/11xxx/CVE-2018-11246.json +++ b/2018/11xxx/CVE-2018-11246.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-11246", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7TSMngr.exe in K7Computing K7AntiVirus Premium 15.1.0.53 has a Memory Leak." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.k7computing.com", + "refsource": "MISC", + "name": "https://www.k7computing.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/8xxx/CVE-2018-8044.json b/2018/8xxx/CVE-2018-8044.json index fdeddba018a..036a2234744 100644 --- a/2018/8xxx/CVE-2018-8044.json +++ b/2018/8xxx/CVE-2018-8044.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8044", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: Local Process Execution (local). The component is: K7Sentry.sys." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/8xxx/CVE-2018-8724.json b/2018/8xxx/CVE-2018-8724.json index a0bbeef6632..41f27bb8b23 100644 --- a/2018/8xxx/CVE-2018-8724.json +++ b/2018/8xxx/CVE-2018-8724.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8724", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/8xxx/CVE-2018-8725.json b/2018/8xxx/CVE-2018-8725.json index cdbb4a983dc..046c0fb07b4 100644 --- a/2018/8xxx/CVE-2018-8725.json +++ b/2018/8xxx/CVE-2018-8725.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8725", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/8xxx/CVE-2018-8726.json b/2018/8xxx/CVE-2018-8726.json index 151e389bc6a..8fca9193082 100644 --- a/2018/8xxx/CVE-2018-8726.json +++ b/2018/8xxx/CVE-2018-8726.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-8726", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7Antivirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/9xxx/CVE-2018-9332.json b/2018/9xxx/CVE-2018-9332.json index f6003cf26c5..a0029212f1c 100644 --- a/2018/9xxx/CVE-2018-9332.json +++ b/2018/9xxx/CVE-2018-9332.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-9332", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.01.00.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2018/9xxx/CVE-2018-9333.json b/2018/9xxx/CVE-2018-9333.json index 5abace9768e..c81fc960070 100644 --- a/2018/9xxx/CVE-2018-9333.json +++ b/2018/9xxx/CVE-2018-9333.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-9333", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Buffer Overflow. The impact is: execute arbitrary code (local). The component is: K7TSMngr.exe." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://k7computing.com", + "refsource": "MISC", + "name": "http://k7computing.com" + }, + { + "url": "http://k7antivirus.com", + "refsource": "MISC", + "name": "http://k7antivirus.com" + }, + { + "refsource": "CONFIRM", + "name": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021", + "url": "https://support.k7computing.com/index.php?/selfhelp/view-article/Advisory-issued-on-6th-January-2021" } ] } diff --git a/2019/18xxx/CVE-2019-18655.json b/2019/18xxx/CVE-2019-18655.json index f4392fa8ef0..037df42085d 100644 --- a/2019/18xxx/CVE-2019-18655.json +++ b/2019/18xxx/CVE-2019-18655.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "http://0xhuesca.com/cve-2019-18655.html", "url": "http://0xhuesca.com/cve-2019-18655.html" + }, + { + "refsource": "MISC", + "name": "https://www.0xhuesca.com/2019/11/cve-2019-18655.html", + "url": "https://www.0xhuesca.com/2019/11/cve-2019-18655.html" } ] } diff --git a/2019/3xxx/CVE-2019-3405.json b/2019/3xxx/CVE-2019-3405.json index 771800cca00..63043ae3d70 100644 --- a/2019/3xxx/CVE-2019-3405.json +++ b/2019/3xxx/CVE-2019-3405.json @@ -1,17 +1,61 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-3405", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-3405", + "ASSIGNER": "security@360.cn", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "360F5", + "version": { + "version_data": [ + { + "version_value": "3.1.3.64296 and lower version." + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "DOS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://security.360.cn/News/news/id/246", + "url": "https://security.360.cn/News/news/id/246" + } + ] + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the 3.1.3.64296 and lower version of 360F5, the third party can trigger the device to send a deauth frame by constructing and sending a specific illegal 802.11 Null Data Frame, which will cause other wireless terminals connected to disconnect from the wireless, so as to attack the router wireless by DoS. At present, the vulnerability has been effectively handled, and users can fix the vulnerability after updating the firmware version." } ] } diff --git a/2020/10xxx/CVE-2020-10758.json b/2020/10xxx/CVE-2020-10758.json index 154589f34f8..d39af756ee5 100644 --- a/2020/10xxx/CVE-2020-10758.json +++ b/2020/10xxx/CVE-2020-10758.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1843849", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1843849" + }, + { + "refsource": "MISC", + "name": "https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251", + "url": "https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251" } ] }, diff --git a/2020/17xxx/CVE-2020-17519.json b/2020/17xxx/CVE-2020-17519.json index 815d273ad6b..4720f21d827 100644 --- a/2020/17xxx/CVE-2020-17519.json +++ b/2020/17xxx/CVE-2020-17519.json @@ -119,6 +119,11 @@ "refsource": "MLIST", "name": "[flink-issues] 20210111 [jira] [Assigned] (FLINK-20916) Typo in test for CVE-2020-17519", "url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1@%3Cissues.flink.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[flink-issues] 20210111 [jira] [Commented] (FLINK-20916) Typo in test for CVE-2020-17519", + "url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d@%3Cissues.flink.apache.org%3E" } ] }, diff --git a/2020/17xxx/CVE-2020-17534.json b/2020/17xxx/CVE-2020-17534.json index aa51e6632d8..cffc1b2dde7 100644 --- a/2020/17xxx/CVE-2020-17534.json +++ b/2020/17xxx/CVE-2020-17534.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-17534", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@apache.org", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Apache NetBeans HTML/Java API", + "version": { + "version_data": [ + { + "version_value": "v1.7" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Disclosure" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E", + "url": "https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%3Cdev.netbeans.apache.org%3E" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local privilege escalation version 1.7.1 creates the temporary directory atomically without dealing with the temporary file: https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6" } ] } diff --git a/2020/24xxx/CVE-2020-24003.json b/2020/24xxx/CVE-2020-24003.json index e3ace30bf93..87af0a28ec0 100644 --- a/2020/24xxx/CVE-2020-24003.json +++ b/2020/24xxx/CVE-2020-24003.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-24003", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-24003", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Microsoft Skype through 8.59.0.77 on macOS has the disable-library-validation entitlement, which allows a local process (with the user's privileges) to obtain unprompted microphone and camera access by loading a crafted library and thereby inheriting Skype Client's microphone and camera access." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.hdwsec.fr/blog/20200608-skype/", + "refsource": "MISC", + "name": "https://www.hdwsec.fr/blog/20200608-skype/" } ] } diff --git a/2020/25xxx/CVE-2020-25659.json b/2020/25xxx/CVE-2020-25659.json index 0d01494ca2a..37b2ae83b28 100644 --- a/2020/25xxx/CVE-2020-25659.json +++ b/2020/25xxx/CVE-2020-25659.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-25659", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "python-cryptography", + "version": { + "version_data": [ + { + "version_value": "python-cryptography 3.2" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-385" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b", + "url": "https://github.com/pyca/cryptography/pull/5507/commits/ce1bef6f1ee06ac497ca0c837fbd1c7ef6c2472b" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "python-cryptography 3.2 is vulnerable to Bleichenbacher timing attacks in the RSA decryption API, via timed processing of valid PKCS#1 v1.5 ciphertext." } ] } diff --git a/2020/26xxx/CVE-2020-26867.json b/2020/26xxx/CVE-2020-26867.json index edcb67b824d..d5f74becfc4 100644 --- a/2020/26xxx/CVE-2020-26867.json +++ b/2020/26xxx/CVE-2020-26867.json @@ -99,6 +99,11 @@ "refsource": "CONFIRM", "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" + }, + { + "refsource": "CONFIRM", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03" } ] }, diff --git a/2020/26xxx/CVE-2020-26868.json b/2020/26xxx/CVE-2020-26868.json index 6cb13baedde..6b8b80c4883 100644 --- a/2020/26xxx/CVE-2020-26868.json +++ b/2020/26xxx/CVE-2020-26868.json @@ -99,6 +99,11 @@ "refsource": "CONFIRM", "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" + }, + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03" } ] }, diff --git a/2020/26xxx/CVE-2020-26869.json b/2020/26xxx/CVE-2020-26869.json index 3919f5371ac..6665522d48f 100644 --- a/2020/26xxx/CVE-2020-26869.json +++ b/2020/26xxx/CVE-2020-26869.json @@ -99,6 +99,11 @@ "refsource": "CONFIRM", "name": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1", "url": "https://www.pcvuesolutions.com/support/index.php/en/security-bulletin/1076-security-bulletin-2020-1" + }, + { + "refsource": "MISC", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-03" } ] }, diff --git a/2020/27xxx/CVE-2020-27275.json b/2020/27xxx/CVE-2020-27275.json index 47dc4e39666..6bba3c501b5 100644 --- a/2020/27xxx/CVE-2020-27275.json +++ b/2020/27xxx/CVE-2020-27275.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27275", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "DOPSoft Version 4.0.8.21 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OUT-OF-BOUNDS WRITE CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics DOPSoft Version 4.0.8.21 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2020/27xxx/CVE-2020-27277.json b/2020/27xxx/CVE-2020-27277.json index 793b1ff97f2..0396300d3f1 100644 --- a/2020/27xxx/CVE-2020-27277.json +++ b/2020/27xxx/CVE-2020-27277.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27277", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "DOPSoft Version 4.0.8.21 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-005-05" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics DOPSoft Version 4.0.8.21 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2020/27xxx/CVE-2020-27287.json b/2020/27xxx/CVE-2020-27287.json index 3a00ae0d490..78f914a57ee 100644 --- a/2020/27xxx/CVE-2020-27287.json +++ b/2020/27xxx/CVE-2020-27287.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27287", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "CNCSoft-B Versions 1.0.0.2 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OUT-OF-BOUNDS WRITE CWE-787" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds write while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2020/27xxx/CVE-2020-27289.json b/2020/27xxx/CVE-2020-27289.json index 385ae6d20e7..f2663b555de 100644 --- a/2020/27xxx/CVE-2020-27289.json +++ b/2020/27xxx/CVE-2020-27289.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27289", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "CNCSoft-B Versions 1.0.0.2 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "UNTRUSTED POINTER DEREFERENCE CWE-822" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a null pointer dereference issue while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2020/27xxx/CVE-2020-27291.json b/2020/27xxx/CVE-2020-27291.json index da50b661bb8..3310c63e600 100644 --- a/2020/27xxx/CVE-2020-27291.json +++ b/2020/27xxx/CVE-2020-27291.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27291", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "CNCSoft-B Versions 1.0.0.2 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "OUT-OF-BOUNDS READ CWE-125" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior is vulnerable to an out-of-bounds read while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2020/27xxx/CVE-2020-27293.json b/2020/27xxx/CVE-2020-27293.json index fa12475f223..79c3d6fe10e 100644 --- a/2020/27xxx/CVE-2020-27293.json +++ b/2020/27xxx/CVE-2020-27293.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-27293", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "ics-cert@hq.dhs.gov", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Delta Electronics", + "version": { + "version_data": [ + { + "version_value": "CNCSoft-B Versions 1.0.0.2 and prior" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "ACCESS OF RESOURCE USING INCOMPATIBLE TYPE ('TYPE CONFUSION') CWE-843" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04", + "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-007-04" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Delta Electronics CNCSoft-B Versions 1.0.0.2 and prior has a type confusion issue while processing project files, which may allow an attacker to execute arbitrary code." } ] } diff --git a/2021/23xxx/CVE-2021-23253.json b/2021/23xxx/CVE-2021-23253.json index 50b07a3127a..2cc340051de 100644 --- a/2021/23xxx/CVE-2021-23253.json +++ b/2021/23xxx/CVE-2021-23253.json @@ -4,14 +4,58 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-23253", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security@opera.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Opera Mini for Android", + "version": { + "version_data": [ + { + "version_value": "Below 53.1" + } + ] + } + } + ] + } + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Address bar spoofing" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://security.opera.com/address-bar-spoofing-in-opera-mini-opera-security-advisories/", + "url": "https://security.opera.com/address-bar-spoofing-in-opera-mini-opera-security-advisories/" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Opera Mini for Android below 53.1 displays URL left-aligned in the address field. This allows a malicious attacker to craft a URL with a long domain name, e.g. www.safe.opera.com.attacker.com. With the URL being left-aligned, the user will only see the front part (e.g. www.safe.opera.com\u2026) The exact amount depends on the phone screen size but the attacker can craft a number of different domains and target different phones. Starting with version 53.1 Opera Mini displays long URLs with the top-level domain label aligned to the right of the address field which mitigates the issue." } ] } diff --git a/2021/3xxx/CVE-2021-3124.json b/2021/3xxx/CVE-2021-3124.json new file mode 100644 index 00000000000..11327104380 --- /dev/null +++ b/2021/3xxx/CVE-2021-3124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file